John Solis

security engineer

San Francisco, CA

Publications

  • Rishab Nithyanand, John Solis, A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem, International Workshop on Trustworthy Embedded Devices (TrustED 2012), co-located with IEEE SnP, Oakland, May 2012. [PDF]

  • John Solis, N. Asokan, Philip Ginzboorg, Jörg Ott, Best Effort Authentication for Opportunistic Networks, 2011 International Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec 2011), Orlando, FL, November 2011. [PDF]

  • Rishab Nithyanand and John Solis, A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem, Sandia Technical Report (SAND2011-6673), September 2011.

  • Rishab Nithyanand, Radu Sion, and John Solis, Solving the Software Protection Problem with Intrinsic Personal Physical Unclonable Functions, Sandia Technical Report (SAND2011-6603), September 2011. [PDF]

  • Geoffrey C. Hulette and John Solis, On Source Code Transformations for Steganographic Applications, Web Intelligence for Information Security Workshop (WIIS'11), Lyon, France, August 2011. [PDF]

  • John Solis, N. Asokan, Kari Kostianinen, Philip Ginzboorg, Jörg Ott, Controlling Resource Hogs in Mobile Delay-Tolerant Networks, Computer Communications (COMCOM'10), 2010.

  • Karim El Defrawy, John Solis, Gene Tsudik, Leveraging Social Contacts for Message Confidentiality in Delay-Tolerant Networks, 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), Seattle, Washington, July 20-24, 2009. [PDF]

  • Michael Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, and Ersin Uzun, Audio Based Authentication, International Journal of Security and Networks (IJSN), 2008.

  • Maithili Narasimha, John Solis, and Gene Tsudik, Privacy-Preserving Revocation Checking, International Journal of Information Security (IJIS), 2008.

  • John Solis and Gene Tsudik, Simple and Flexible Revocation Checking with Privacy, Privacy Enhancing Technologies (PET 2006), June 2006. [PDF]

  • Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun, Loud And Clear: Human Verifiable Authentication Based on Audio, ICDCS 2006, July 2006. [PDF]

  • Posters

  • Rishab Nithyanand, Radu Sion, and John Solis, Making the Case for Intrinsic Personal Physical Unclonable Functions, 18th ACM Conference on Computer and Communications Security (ACM CCS), Chicago, IL, October 2011. [Extended Abstract] [Poster]

  • John Solis, Private Searching for Sensitive File Signatures, International Conference on Security and Cryptography (SECRYPT'11), Seville, Spain, July 2011. [Extended Abstract]

  • Karim El Defrawy, John Solis, Gene Tsudik, Leveraging Social Contacts for Message Confidentiality in Delay-Tolerant Networks, IEEE International Conference of Network Protocols (ICNP 2008), Orlando, Florida, October 19-22, 2008. [Extended Abstract]