a picture of me

Naveen K. Sastry

no spammers
[home]

I graduated from the UC Berkeley Computer Science department in 2007. I was advised by David Wagner and will always appreciate his excellent guidance.

Papers:

Verifiable Functional Purity in Java
Matthew Finifter, Adrian Mettler, Naveen Sastry, and David Wagner. 15th ACM Conference on Computer and Communication Security (CCS 2008), October 27-31, 2008. [bibtex]
Source Code Review of the Sequoia Voting System
Matt Blaze, Arel Cordero, Sophie Engle, Chris Karlof, Naveen Sastry, Micah Sherr, Till Stegers, Ka-Ping Yee.
This report was part of the California Secretary of State's "Top to Bottom Review" of electronic voting systems conducted during the summer of 2007. July 20, 2007. [bibtex]
Verifying Security Properties in Electronic Voting Machines
Naveen Sastry. Ph.D. dissertation, May 2007, University of California Berkeley. [bibtex]
Also available as UC Berkeley Tech Report, UCB/EECS-2007-61, May 2007
Designing voting machines for verification.
Naveen Sastry, Tadayoshi Kohno, David Wagner. Proceedings of the Fifteenth USENIX Security Symposium (USENIX Security 2006). August 2006. [ps] [bibtex]
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine (Extended Abstract).
David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner. Extended Abstract, IEEE Security and Privacy (Oakland) 2006. [ps] [bibtex] [eprint long version]
Security Analysis of the Diebold AccuBasic Interpreter
David Wagner, David Jefferson, Matt Bishop, Chris Karlof, and Naveen Sastry. Report of the California Secretary of State's Voting Systems Technology Assessment Advisory Board (VSTAAB). February 14, 2006. [bibtex] [LATimes article]
Our report contains a detailed technical analysis of the security issues associated with the AccuBasic interpreter in Diebold voting machines. The California Secretary of State's office commissioned the report.
Fixing Races for Fun and Profit: How to abuse atime
Nikita Borisov, Rob Johnson, Naveen Sastry, and David Wagner. Proceedings of the Fourteenth USENIX Security Symposium (USENIX Security 2005), August 2005. [ps] [bibtex]
Cryptographic Voting Protocols: A Systems Perspective
Chris Karlof, Naveen Sastry, and David Wagner. Proceedings of the Fourteenth USENIX Security Symposium (USENIX Security 2005), August 2005. [ps] [bibtex]
The Promise of Cryptographic Voting Protocols
This piece presents our opinions on cryptographic voting protocols based on our USENIX 2005 paper.
Chris Karlof, Naveen Sastry, and David Wagner. June 2005. [ps] [bibtex]
Design and Implementation of a Sensor Network System for Vehicle Tracking and Autonomous Interception
Cory Sharp, Shawn Schaffert, Alec Woo, Naveen Sastry, Chris Karlof, Shankar Sastry, and David Culler. Second European Workshop on Wireless Sensor Networks (EWSN'05). January 31 - February 2, 2005. [ps] [bibtex]
Security Considerations for IEEE 802.15.4 Networks
Naveen Sastry and David Wagner. ACM Workshop on Wireless Security (WiSE 2004). October 1, 2004. [ps] [bibtex] I won best student paper.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks.
Chris Karlof, Naveen Sastry, and David Wagner. Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004). November 2004. [ps] [bibtex]
Secure Verification of Location Claims
Naveen Sastry, Umesh Shankar, and David Wagner. CryptoBytes volume 6, no. 1, Spring 2004 RSA Labs. Shortened version of our WiSe conference paper (below). [ps] [bibtex]
Secure Verification of Location Claims
Naveen Sastry, Umesh Shankar, and David Wagner. ACM Workshop on Wireless Security (WiSe 2003), pages 1-10, September 19, 2003. [ps] [bibtex]
Distillation Codes and Applications to DoS Resistant Multicast Authentication
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar. Proceedings of the Eleventh Annual Network and Distributed Systems Security Symposium (NDSS 2004), pages 37-56, February 2004. [ps] [bibtex]
Scrash: A System for Generating Secure Crash Information
Pete Broadwell, Matt Harren, Naveen Sastry. Usenix Security 2003, pages 273-284, August 2003. [ps] [presentation] [old website] [bibtex]
FIG: A Prototype Tool for Online Verification of Recovery Mechanisms
Pete Broadwell, Naveen Sastry, and Jonathan Traupman. Workshop on Self-Healing, Adaptive and Self-MANaged Systems (SHAMAN). New York. June 2002. [ps] [presentation I won best student presentation.] [website] [bibtex]
Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies.
Patterson, D. A., A. Brown, P. Broadwell, G. Candea, M. Chen, J. Cutler, P. Enriquez, A. Fox, E. Kiciman, M. Merzbacher, D. Oppenheimer, N. Sastry, W. Tetzlaff, J. Traupman, N. Treuhaft. UC Berkeley Computer Science Technical Report UCB||CSD-02-1175 [ps] [bibtex]
see also Self-Repairing Computers. Armando Fox, David Patterson. Scientific American. June 2003. that mentions FIG.