Hovav Shacham

Associate Professor
Department of Computer Science and Engineering
University of California, San Diego

Office: EBU 3B 3124
E-mail: hovav@cs.ucsd.edu
Address: UCSD Dept. of CSE
9500 Gilman Drive, MC 0404
La Jolla, CA 92093-0404
Phone: (858) 822-7921
Fax: (858) 534-7029

On this page:

Elsewhere:


Professional Activities

I am a member of the editorial board of the USENIX Journal of Election Technology and Systems (JETS).

In January, 2014, I signed an open letter from US researchers in cryptography and information security: masssurveillance.info.

Publications

Recent publications include:

T. Calderon, S. Meiklejohn, H. Shacham, and B. Waters. “Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.” In J. Benaloh, ed., Proceedings of CT-RSA 2014, Springer-Verlag, Feb. 2014. To appear. (Details; PDF)

W. Lian, E. Rescorla, H. Shacham, and S. Savage. “Measuring the Practical Impact of {DNSSEC} Deployment.” In S. King, ed., Proceedings of USENIX Security 2013. USENIX, Aug. 2013. (Details; PDF)

H. Shacham and B. Waters. “Compact Proofs of Retrievability.” J. Cryptology 26(3):442–83, Jul. 2013. (Details; PDF)

K. Mowery, M. Wei, D. Kohlbrenner, H. Shacham, and S. Swanson. “Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.” In W. Lee, A. Perrig, and M. Backes, eds., Proceedings of IEEE Security and Privacy (“Oakland”) 2013, pages 589–603. IEEE Computer Society, May 2013. (Details; PDF)

B. Adida, C. Anderson, A.I. Anton, M. Blaze, R. Dingledine, E.W. Felten, M.D. Green, J.A. Halderman, D.R. Jefferson, C. Jennings, S. Landau, N. Mitter, P.G. Neumann, E. Rescorla, F.B. Schneider, B. Schneier, H. Shacham, M. Sherr, D. Wagner, and P. Zimmermann. “CALEA II: Risks of Wiretap Modifications to Endpoints.” May 2013. Report, coordinated by the Center for Democracy & Technology. (PDF)

S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters. “Sequential Aggregate Signatures and Multisignatures without Random Oracles.” J. Cryptology 26(2):340–73, Apr. 2013. (Details; PDF)

S. Checkoway and H. Shacham. “Iago Attacks: Why the System Call API is a Bad Untrusted RPC Interface.” In R. Bodik, ed., Proceedings of ASPLOS 2013, pages 253–64. ACM Press, Mar. 2013. (Details; PDF)

K. Benson, H. Shacham, and B. Waters. “The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.” In E. Dawson, ed., Proceedings of CT-RSA 2013, vol. 7779 of LNCS, pages 310–25. Springer-Verlag, Feb. 2013. (Details; PDF)

A. Sarwate, S. Checkoway and H. Shacham. “Risk-limiting Audits for Nonplurality Elections.” Statistics, Politics, and Policy, 3(3):29–64, Jan. 2013. (Details; PDF)

K. Mowery, S. Keelveedhi, and H. Shacham. “Are AES x86 Cache Timing Attacks Still Feasible?” (Short Paper). In S. Capkun and S. Kamara, eds., Proceedings of CCSW 2012. ACM Press, Oct. 2012. (Details; PDF)

All my publications are available online.

Teaching

Current Students

Ph.D. students:

Former Students

Brief Biography

Hovav Shacham joined UC San Diego’s Department of Computer Science and Engineering in Fall 2007.

Shacham received his Ph.D. in computer science in 2005 from Stanford University, where he had also earned, in 2000, an A.B. in English. His Ph.D. advisor was Dan Boneh. In 2006 and 2007, he was a Koshland Scholars Program postdoctoral fellow at the Weizmann Institute of Science, hosted by Moni Naor.

Shacham’s research interests are in applied cryptography, systems security, privacy-enhancing technologies, and tech policy.

In 2007, Shacham participated in California Secretary of State Debra Bowen’s “Top-to-Bottom” review of the voting machines certified for use in California. He was a member of the team reviewing Hart InterCivic source code; the report he co-authored was cited by the Secretary in her decision to withdraw approval from Hart voting machines.


Image Credits

Photo copyright 2010 by Nick Vossbrink. All rights reserved.

Portrait copyright 2011 by Natalie Bessell. All rights reserved.

BSD Daemon Copyright 1988 by Marshall Kirk McKusick.
All Rights Reserved.

Permission to use the daemon may be obtained from:

Marshall Kirk McKusick
1614 Oxford St
Berkeley, CA 94709–1608
USA

or via email at mckusick@mckusick.com.


Navigation: Hovav Shacham