Journal articles

  1. Fabric: Building Open Distributed Systems Securely by Construction
    A secure, decentralized, and distributed programming language and system.
    JCS’17
    Liu, Jed and Arden, Owen and George, Michael D. and Myers, Andrew C.
  2. Using Program Analysis to Improve Database Applications
    Cheung, Alvin and Madden, Samuel and Solar-Lezama, Armando and Arden, Owen and Myers, Andrew C.

Conference proceedings

  1. Decentagram: Highly-Available Decentralized Publish/Subscribe Systems
    A secure, decentralized pub/sub system for on-chain and off-chain subscribers using smart contracts and trusted execution environments.
    DSN’24   Distinguished artifact award
    Zheng, Haofan and Tran, Tuan and Shadmon, Roy and Arden, Owen
  2. Unstick Yourself: Recoverable Byzantine Fault Tolerant Services
    Improving the recoverability of Byzantine fault tolerant protocols.
    ICBC’23
    Tran, Tuan and Nawab, Faisal and Alvaro, Peter and Arden, Owen
  3. Applying consensus and replication securely with FLAQR
    A formal language for building application-level consensus and replication protocols that are secure by construction.
    CSF’22   Distinguished paper award
    Mondal, Priyanka and Algehed, Maximilian and Arden, Owen
  4. Payment Channels Under Network Congestion
    Addressing congestion attacks in payment channel networks.
    ICBC’22 (short paper)
    Tran, Tuan and Zheng, Haofan and Alvaro, Peter and Arden, Owen
  5. Total Eclipse of the Enclave: Detecting Eclipse Attacks From Inside TEEs
    Using difficulty monitoring to reliably detect extended eclipse attacks, even when the adversary controls all network connectivity.
    ICBC’21 (short paper)
    Zheng, Haofan and Tran, Tuan and Arden, Owen
  6. Secure Distributed Applications the Decent Way
    A framework for building secure decentralized applications with trusted execution environments and remote attestation.
    ASSS’21
    Zheng, Haofan and Arden, Owen
  7. AttkFinder: Discovering Attack Vectors in PLC Programs Using Information Flow Analysis
    Using information flow analysis to discover attack vectors in industrial control systems.
    RAID’21
    Castellanos, John H. and Ochoa, Martin and Cardenas, Alvaro A. and Arden, Owen and Zhou, Jianying
  8. First-Order Logic for Flow-Limited Authorization
    A logic for reasoning about authorization decisions in the presence of information-flow policies.
    CSF’20
    Hirsch, Andrew K. and Azevedo de Amorim, Pedro Henrique and Cecchetti, Ethan and Tate, Ross and Arden, Owen
  9. AnyLog: a Grand Unification of the Internet of Things
    A new vision for a completely decentralized, ownerless platform for sharing structured data.
    CIDR’20
    Abadi, Daniel and Arden, Owen and Nawab, Faisal and Shadmon, Moshe
  10. Information flow control for distributed trusted execution environments
    DFLATE offers high-level security abstractions that reflect both the guarantees and limitations of the TEE security mechanisms.
    CSF’19
    Gollamudi, Anitha and Chong, Stephen and Arden, Owen
  11. Nonmalleable Information Flow Control
    A new 4-safety hyperproperty for secure declassification and endorsement and a type system for enforcing it.
    CCS’17   Best paper finalist (11 finalists out of 151 accepted papers).
    Cecchetti, Ethan and Myers, Andrew C. and Arden, Owen
  12. Cryptographically Secure Information Flow Control on Key-Value Stores
    An information flow control system that transparently incorporates cryptography to enforce confidentiality and integrity policies on untrusted storage.
    CCS’17
    Waye, Lucas and Buiras, Pablo and Arden, Owen and Russo, Alejandro and Chong, Stephen
  13. A Calculus for Flow-Limited Authorization
    A core programming model that uses flow-limited authorization to provide end-to-end information security to dynamic authorization mechanisms and programs that use them.
    CSF’16
    Arden, Owen and Myers, Andrew C.
  14. Flow-Limited Authorization
    CSF’15
    Arden, Owen and Liu, Jed and Myers, Andrew C.
  15. Warranties for Faster Strong Consistency
    Distributed transactions can be sped up by giving clients time-limited invariants on state and computation.
    NSDI’14
    Liu, Jed and Magrino, Tom and Arden, Owen and George, Michael D. and Myers, Andrew C.
  16. StatusQuo: Making familiar abstractions perform using program analysis
    A new 4-safety hyperproperty for secure declassification and endorsement and a type system for enforcing it.
    CIDR’13   Best paper
    Cheung, Alvin and Madden, Samuel and Solar-Lezama, Armando and Arden, Owen and Myers, Andrew C.
  17. Automatic Partitioning of Database Applications
    Pyxis adaptively migrates computation between clients and a database server by combining static dependency analysis with dynamic workload profiling.
    VLDB’12
    Cheung, Alvin and Madden, Samuel and Arden, Owen and Myers, Andrew C.
  18. Sharing Mobile Code Securely With Information Flow Control
    A new architecture for secure mobile code for publishing and sharing code dynamically across trust domains.
    SSP’12
    Arden, Owen and George, Michael D. and Liu, Jed and Vikram, K. and Askarov, Aslan and Myers, Andrew C.

Other publications

  1. A Calculus for Flow-Limited Authorization: Expanded Technical Report
    A core programming model that uses flow-limited authorization to provide end-to-end information security to dynamic authorization mechanisms and programs that use them.
    Technical Report   Revised, corrected, and expanded version of CSF’16 paper
    Arden, Owen and Gollamudi, Anitha and Cecchetti, Ethan and Chong, Stephen and Myers, Andrew C
  2. Flow-Limited Authorization
    Ph.D. Dissertation
    Arden, Owen