ELAINE (RUNTING) SHI

    I am an Assistant Professor in the Computer Science Department at University of Maryland, College Park.

    My research combines systems and theory to design new computing systems that are secure and privacy-preserving. In particular, I am interested in privacy, applied cryptography, system security, language-based security, Trusted Computing, as well as security and privacy technologies for cloud computing and ubiquitous computing.

    I obtained my Ph.D. from the Computer Science Department at Carnegie Mellon University in 2008. My advisor was Adrian Perrig. I was a Member of Research Staff at PARC from 2008 to 2011. Between 2010 and 2012, I was a research scientist at UC Berkeley working with Dawn Song and the AMPLab.

    I am a Sloan Research Fellow (2014).

    If you are interested in working with me, please email me at elaine at cs dot umd dot edu, and include in the subject line "prospective student seeking admission" or "prospective postdoc seeking admission".




 







  Teaching:


 
CMSC 414: Computer and Network Security, Spring 2014.

 
CMSC 818J: Designing Secure Systems with Cryptography, Fall 2013.

 
CMSC 414: Computer and Network Security, Spring 2013.

 
CMSC 818F : Securing and Monetizing the Internet, Spring 2013.
  Co-taught with Dr. Dave Levin

 
CMSC 818J: Privacy Enhancing Technologies: From Theory to Practice, Fall 2012.

 
CS 294-78 : Special topics on Technologies for Education and Learning at Large Scale, Spring 2012.
  Co-taught with Professor Dawn Song

 
CS 294-65: Privacy Technologies: From Theory to Practice, Spring 2011.
  Co-taught with Professor Dawn Song

 
Two-day tutorial on privacy-enhancing technologies, Technicolor, Summer 2011.
  Co-taught with Professor Dawn Song



  Current Students and Postdocs:


 
I am fortunate to work with a group of bright students.
 
Ph.D. Students: Xiong Fan, Ahmed Kosba (Co-advised with Charalampos Papamanthou), Chang Liu (Co-advised with Michael Hicks and Bobby Bhattacharjee), Andrew Miller (Co-advised with Jonathan Katz and Michael Hicks), Kartik Nayak, Youngsam Park (Co-advised with Damon McCoy), and Xiao Shaun Wang.

Postdoc: Feng-Hao Liu (Co-advised with Jonathan Katz)




  Professional Activities:


 
Program Committees:
 
WWW'15 , ICICS'14 (co-chair), AsiaCCS-SCC workshop'14 (co-chair), Crypto'14, WWW'14, eCrimes Workshop'13, CCSW'13, AISec'13 (co-chair), AsiaCCS-SCC workshop'13 (co-chair), Usenix Security'13, WWW'13, WiSec'13, PETS'13, NDSS'13, CODASPY'13, ACM SAC'13 (DADS Track), WPES'12, NDSS'12, ICDE'12, ESORICS'12, CODASPY'12, CANS'12, CCSW'12, AISEC'12, Trust'12, MobiSec'12, HealthSec'12, WiSec'12, NSS'12, CODASPY'11, CANS'11, CCSW'11, AISec'11, WWW'10, ISC'10, CCSW'10, Pairing'09.


  Software Collection:


          We are always in the process of open sourcing new software developed for our projects. Please check back for new updates and new software.

 
GUPT: A Differentially Private Data Mining Platform.

  Publications:


 
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
    Xiao Shaun Wang, T-H. Hubert Chan, and Elaine Shi. Preprint, 2014.

 
SCORAM: Oblivious RAM for Secure Computation.
    Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS), 2014.

 
Oblivious Data Structures.
    Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. In ACM Conference on Computer and Communications Security (CCS), 2014.

 
ShadowCrypt: Encrypted Web Applications for Everyone.
    Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, and Dawn Song. In ACM Conference on Computer and Communications Security (CCS), 2014.

 
TrueSet: Nearly Practical Verifiable Set Computations.
    Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, and Nikos Triandopoulos. In Usenix Security, 2014.

 
Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns.
    Jonathan Dautrich, Emil Stefanov, and Elaine Shi. In Usenix Security, 2014.

 
SDDR: Light-Weight, Secure Mobile Encounters.
    Matthew Lentz, Viktor Erdelyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, and Bobby Bhattacharjee. In Usenix Security, 2014.
*** Source code now available on our project webpage.

 
EnCore: Private, Context-based Communication for Mobile Social Apps.
    Paarijaat Aditya, Viktor Erdelyi, Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, and Peter Druschel. In International Conference on Mobile Systems, Applications, and Services (MobiSys), 2014.

 
A Secure Computation Framework for Software Defined Networks.
    Nachikethas A. Jagadeesan, Ranjan Pal, Kaushik Nadikuditi, Yan Huang, Minlan Yu, and Elaine Shi. In ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN poster), 2014.

 
PermaCoin: Repurposing Bitcoin Work for Long-Term Data Preservation.
    Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. In IEEE Symposium on Security and Privacy (S&P), 2014.

 
Automating Efficient RAM-Model Secure Computation.
    Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, and Michael Hicks. In IEEE Symposium on Security and Privacy (S&P), 2014.

 
Multi-Input Functional Encryption.
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou. In Eurocrypt, 2014.
Merge of this and this.

 
Verifiable Oblivious Storage.
    Daniel Apon, Jonathan Katz, Elaine Shi, and Aishwarya Thiruvengadam. In International Conference on Practice and Theory of Public-Key Cryptography (PKC), 2014.

 
Practical Dynamic Searchable Symmetric Encryption with Small Leakage.
    Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. In Network and Distributed System Security Symposium (NDSS), 2014.

 
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
    Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, and Markus Jakobsson. In Network and Distributed System Security Symposium (NDSS), 2014.

 
Authenticated Data Structures, Generically.
    Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi. In ACM Symposium on Principles of Programming Languages (POPL), 2014.
*** Source code and examples (including red-black tree, skip list, planar separator, and more) now available on our project webpage.

 
A High-Performance Oblivious RAM Controller on the Convey HC-2ex Heterogeneous Computing Platform.
    Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, and Dawn Song. In Workshop on the Intersections of Computer Architecture and Reconfigurable Logic (CARL), 2013.

 
Practical Dynamic Proofs of Retrievability.
    Elaine Shi, Emil Stefanov, and Charalampos Papamanthou. In ACM Conference on Computer and Communications Security (CCS), 2013.
UMD Invention of the Year Award.

 
Path ORAM: An Extremely Simple Oblivious RAM Protocol.
    Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. In ACM Conference on Computer and Communications Security (CCS), 2013.
Best Student Paper.    A simplified version of the proof is now available.

 
PHANTOM: Practical Oblivious Computation in a Secure Processor.
    Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, and Dawn Song. In ACM Conference on Computer and Communications Security (CCS), 2013.
Finalist for AT&T Best Applied Security Paper Award.

 
Multi-Cloud Oblivious Storage.
    Emil Stefanov, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS), 2013.

 
ObliviStore: High Performance Oblivious Cloud Storage.
    Emil Stefanov and Elaine Shi. In IEEE Symposium on Security and Privacy (S&P), 2013.
A preliminary version appeared as a short presentation in NDSS, 2013.   Source code is available upon request.

 
Memory Trace Oblivious Program Execution.
    Chang Liu, Mike Hicks, and Elaine Shi. In Computer Security Foundations Symposium (CSF), 2013.
NSA Best Scientific Cybersecurity Paper Award.

 
Streaming Authenticated Data Structures.
    Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, and Ke Yi. In Eurocrypt, 2013.

 
Signatures of Correct Computation.
    Charalampos Papamanthou, Elaine Shi, and Roberto Tamassia. In Theory of Cryptography Conference (TCC), 2013.

 
Optimal Lower Bound for Differentially Private Multi-Party Aggregation.
    T-H. Hubert Chan, Elaine Shi, and Dawn Song. In European Symposium on Algorithms (ESA), 2012.

 
Context-Centric Security.
    Mohit Tiwari, Prashanth Mohan, Andrew Osheroff, Hilfi Alkaff, Elaine Shi, Eric Love, Dawn Song, and Krste Asanovic. In USENIX Workshop on Hot Topics in Security (HotSec), 2012.

 
Jointly Predicting Links and Inferring Attributes with a Social-Attribute Network: an Empirical Study using Google+.
    Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, and Dawn Song. In ACM workshop on Social Network Mining and Analysis (SNA-KDD), 2012. Invited to a special issue of ACM TIST.
Google+ dataset (Collected by Emil Stefanov, Richard Shin, and myself. Now managed by Neil Gong).

 
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams.
    T-H. Hubert Chan, Mingfei Li, Elaine Shi and Wenchang Xu. In Privacy Enhancing Technologies Symposium (PETS), 2012.

 
Opaak: Using Mobile Phones to Limit Anonymous Identities Online.
    Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song. In International Conference on Mobile Systems, Applications and Services (MobiSys), 2012.

 
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
    Emil Stefanov, Elaine Shi, Dawn Song. In International Conference on Practice and Theory of Public-Key Cryptography (PKC), 2012.

 
GUPT: Privacy Preserving Data Analysis Made Easy.
    Prashanth Mohan, Abhradeep Guha Thakurta, Elaine Shi, Dawn Song, David Culler. In ACM SIGMOD, 2012.

 
Towards Practical Oblivious RAM.
    Emil Stefanov, Elaine Shi, Dawn Song. In Network and Distributed System Security Symposium (NDSS), 2012.     Code is available here.

 
Cloud Data Protection for the Masses.
    Dawn Song, Umesh Shankar, Elaine Shi, Ian Fischer. Invited article at IEEE Computer Magazine, Annual Outlook Issue, 2012.

 
Privacy-Preserving Stream Aggregation with Fault Tolerance.
    T-H. Hubert Chan, Elaine Shi, Dawn Song. In Financial Cryptography and Data Security (FC), 2012.

 
Bitter to Better: How to Make Bitcoin a Better Digital Currency.
    Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun. In Financial Cryptography and Data Security (FC), 2012.

 
Oblivious RAM with O(log N ^ 3) Worst-Case Cost.
    Elaine Shi, T-H. Hubert Chan, Emil Stefanov, Mingfei Li. In ASIACRYPT, 2011.

 
Private and Continual Release of Statistics.
    T-H. Hubert Chan, Elaine Shi, Dawn Song. In ACM Transactions on Information and System Security (TISSEC), 2011.   (An earlier conference version appeared in ICALP'10.)

 
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge.
    Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein. In International Joint Conference on Neural Networks (IJCNN), 2011.
Winner of the IJCNN/Kaggle Social Network Challenge!

 
Privacy-Preserving Aggregation of Time-Series Data.
    Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow, Dawn Song. In Network and Distributed System Security Symposium (NDSS), 2011.

 
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
    Petros Maniatis, Devdatta Akhawe, Kevin Fall, Elaine Shi, Stephen McCamant, Dawn Song. In Workshop on Hot Topics in Operating Systems (HotOS), 2011.

 
ES-TeV: Efficient and Secure Threshold-based Event Validation for VANETs.
    Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig. In ACM Conference on Wireless Network Security (WiSec), 2011.

 
Privacy Settings in Context: A Case Study using Google Buzz.
    Daisuke Mashima, Elaine Shi, Prateek Sarkar, Richard Chow, Chris Li, Dawn Song. In IEEE International Workshop on SEcurity and SOCial Networking (SESOC), 2011.

 
Private and Continual Release of Statistics.
    T-H. Hubert Chan, Elaine Shi, Dawn Song. In International Colloquium on Automata, Languages and Programming (ICALP), 2010.

 
Signatures of Reputation: Towards Trust Without Identity.
    John Bethencourt, Elaine Shi, Dawn Song. In Financial Cryptography (FC), 2010.

 
Implicit Authentication through Learning User Behavior.
    Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow. In Information Security Conference (ISC), 2010.

 
Authentication in the Clouds: A Framework and its Application to Mobile Users.
    Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song. In The ACM Cloud Computing Security Workshop (CCSW), 2010.

 
One Experience Collecting Sensitive Mobile Data.
    Yuan Niu, Elaine Shi, Richard Chow, Philippe Golle, Markus Jakobsson. In Usable Security Experiment Reports (USER) Workshop, 2010.

 
Predicate Privacy in Encryption Systems.
    Emily Shen, Elaine Shi, Brent Waters. In Theory of Cryptography Conference (TCC), 2009.

 
Controlling data in the cloud: outsourcing computation without outsourcing control.
    Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Elaine Shi, Jessica Staddon. In ACM workshop on Cloud computing security (CCSW), 2009.

 
Implicit Authentication for Mobile Devices.
    Markus Jakobsson, Elaine Shi, Philippe Golle, Richard Chow. In USENIX Workshop on Hot Topics in Security (HotSec), 2009.

 
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs.
    Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig. In IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009.

 
Is it too late for PAKE?
    John Engler, Chris Karlof, Elaine Shi, Dawn Song. In Web 2.0 Security and Privacy (W2SP), 2009.

 
Delegating Capabilities in Predicate Encryption Systems.
    Elaine Shi, Brent Waters. In International Colloquium on Automata, Languages and Programming (ICALP), 2008.

 
Multi-Dimensional Range Query over Encrypted Data.
    Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig. In IEEE Symposium on Security and Privacy (Oakland), 2007.
    Errata: The conference version has a typo in the subscript of \beta on page 10, the online version is correct.
    Technical report version (full version) : CMU-CS-06-135R, May 2006

 
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks.
    Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, Yih-Chun Hu. In ACM SIGCOMM, 2007.

 
OverDoSe: A Generic DDoS Protection Service Using an Overlay Network.
    Elaine Shi, Ion Stoica, David Andersen, Adrian Perrig. Technical report, CMU-CS-06-114, February, 2006.

 
Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms.
    Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert Van Doorn, Pradeep Khosla. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), October, 2005.

 
BIND: A Fine-grained Attestation Service for Secure Distributed Systems.
    Elaine Shi, Adrian Perrig, Leendert Van Doorn. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May, 2005.

 
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
    Jonathan McCune, Elaine Shi, Adrian Perrig, Mike Reiter. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May, 2005.

 
The Sybil Attack in Sensor Networks: Analysis and Defense.
    James Newsome, Elaine Shi, Dawn Song, Adrian Perrig. In Proceedings of Information Processing in Sensor Networks (IPSN), April, 2004.

 
Designing Secure Sensor Networks.
    Elaine Shi, Adrian Perrig. In IEEE Wireless Communications, Volume 11, Issue 6, December, 2004.

 
The Smart Classroom: Merging Technologies for Seamless Tele-education.
    Yuanchun Shi, Weikai Xie, Guangyou Xu, Runting Shi, Enyi Chen, Yanhua Mao, Fang Liu. In IEEE Pervasive Computing, Volume 2, Issue 2, 2003.

 
TORM: a hybrid multicast infrastructure for interactive distance learning.
    Yi Che, Runting Shi, Yuanchun Shi. In IEEE International Conference on Multimedia and Expo (ICME), 2004.

 
SameView: A Large-Scale Real-Time Interactive E-learning System Based on TORM and AMTP.
    Yi Che, Runting Shi, Yuanchun Shi, Guangyou Xu. In Proceedings of International Conference on Web-Based Learning (ICWL), 2003.

 
A Novel Stream Merging Algorithm for VOD Servers.
    Runting Shi, Ling Shao, Yunzhang Pei and Dong Xie. In Proceedings of IEEE Pacific-Rim Conference On Multimedia, 2003.

 
A Peer-to-peer True VOD System by Hierarchy Merge.
    Guohui Lin, Runting Shi, Ling Shao, Pei Yunzhang and Dong Xie. In Proceedings of International Workshop on Grid and Cooperative Computing (GCC), 2002.



Last Updated: July, 2014.


free web stats