Roger Khazan

J. Holliman, M. Zhivich, R. Khazan, A. Swiston, B. Telfer, Building Low-Power Trustworthy Systems: Cyber-Security Considerations for Real-Time Physiological Status Monitoring, MILCOM 2016, Baltimore, MD, November 2016.
(Full Paper)

Koziel, E., Thurmer, K., Milechin, L., Grossmann, P., Vai, M., Khazan, R., Bergevin, K., Comer, P., Side Channel Authenticity Discriminant Analysis for Device Class Identification, GOMACTech 2016, Orlando, FL, 16 March 2016.
(Full Paper)

O'Melia, S., Utin, D., Khazan, R., Practical Key Management for Protected Anti-jam Tactical SATCOM, in Military Communications Conference (MILCOM), Restricted Program, 2016.

O'Melia, S., Cunningham, R., Khazan, R., Utin, D., Vai, M., Solving Security Challenges in Open-Architecture Airborne Systems, in Classified US Military Communications Conference (CUMC), 2013.

Pickard, G., Khazan, R., Fuller, B., Cooley, J., DSKE: Dynamic Set Key Encryption, 7th LCN Workshop on Security in Communications Networks, 2012.
(Full Paper)

Khazan, R., Herzog, J., Petcher, A., Utin, D., O'Melia, S., A Comprehensive Key Management Architecture for Small Unmanned Aircraft Systems, in Military Communications Conference (MILCOM), Classified Track, 2011.

Yuditskaya, S., O'Melia, S., Herzog, J., Khazan, R., Usable Identity Management for Tactical Devices, in Military Communications Conference (MILCOM), Classified Track, 2011.

Herzog, J., Khazan, R., Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax, IETF Request for Comments Standard (RFC #6278), 2011.
(Full paper)

Petcher, A., Khazan, R., Utin, D., A usable interface for location-based access control and Over-The-Air Keying in tactical environments, Military Communications Conference (MILCOM), Baltimore, MD, November 2011.
(Full Paper)

O'Melia, S., Khazan, R., and Utin, D., Efficient Transmission of DoD PKI Certificates in Tactical Networks, Military Communications Conference (MILCOM), Baltimore, MD, November 2011.
(Full Paper)

Cooley, J. A., Khazan, R. I., McVeety, S., Secure channel establishment in disadvantaged networks : Optimizing TLS using intercepting proxies, Military Communications Conference (MILCOM), 31 Oct–3 Nov 2010.
(Full Paper)

Fuller, B. W., Khazan, R. I., Cooley, J. A., Pickard, G. E., Utin, D., ASE: Authenticated Statement Exchange, IEEE Network Computing and Applications 2010, Cambridge, Massachusetts, June 15, 2010.
(Full Paper)

Cooley, J. A., Khazan, R. I., Fuller, B. W., Pickard, G.E., GROK: A Practical System for Securing Group Communications, IEEE Network Computing and Applications 2010, Cambridge, Massachusetts, June 15, 2010.
(Full Paper)

Okano, S., Khazan, R., Fuller, B., Cooley, J., Optimizing Secure Communication Standards for Disadvantaged Networks, MIT EECS Thesis, Cambridge, MA, Aug. 31, 2009.
(Full Paper)

McVeety, S., Khazan, R., Cooley, J., Secure Channel Establishment in Disadvantaged Networks: TLS Optimization Using Intercepting Proxies, MIT EECS Thesis, Cambridge, MA, Aug. 18, 2009.
(Full Paper)

Khazan, R., Cooley, J. A., Pickard, G. E., Fuller, B., GROK Secure Multi-User Chat at Red Flag 2007-03, MILCOM 2008, San Diego, CA. Nov. 17-19, 2008.
(Full Paper)

Wu, B. C., Khazan, R. I., An Identity and Certificate Manager, Department of Electrical Engineering and Computer Science MIT, Massachusetts Institute of Technology, Cambridge, MA. September 4, 2007.
(Full Paper)

Kannan, S. K., Khazan, R. I., Cooley, J., Securing Voice Over IP Conferencing with Decentralized Group Encryption, Department of EE and Computer Science Massachusetts Institute of Technology, Cambridge, MA. September 4, 2007.
(Full Paper)

Brown, R.E., Khazan, R.I., Zhivich, M.A., AWE: Improving Software Analysis through Modular Integration of Static and Dynamic Analyses. Program Analysis for Software Tools and Engineering, San Diego, CA, June 13-14, 2007.
(Full Paper)

Khazan, R., Figueriredo, R., McLain, C., Cunningham, R., Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments, MILCOM 2006, Washington, DC, 23 October 2006.
(Full Paper)

Khazan, R., McLain, C., Cunningham, R., Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments, Tactical Networking Workshop, MIT Lincoln Laboratory, 14 June 2006.
(Full Paper)

Khazan, R., Yuditskaya, S., Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms. 10th Annual Workshop on Dependable Parallel, Distributed and Network-Centric Systems (DPDNS 2005)
(Full Paper)

Khazan, R., Yuditskaya, S., A Wide Area Network Simulation of Single-Round Group Membership Algorithms. IEEE NCA, Cambridge, MA, 27–29 July 2005.
(Full Paper

Khazan, R. I., Lewandowski, S. M., Weinstein, C. J., Goulet, S. A., Rak, S. J., Ramanan, P., Parks, T. M., Hamler, M. C., Robust Collaborative Multicast Service for Airborne Command and Control Environment, MILCOM 2004, November 2004.
(Full Paper)

Khazan, R. I., Group Membership: A Novel Approach and the First Single-Round Algorithm, 23rd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), Canada, pp. 347–356, July 2004.
(Full Paper)

Rabek, J. C., Cunningham, R. K., Khazan, R. I., Detecting Privilege-Escalating Executable Exploits, ICDM Workshop on Data Mining for Computer Security, Melbourne, Florida, November 2003.
(Full Paper)

Rabek, J. C., Khazan, R. I., Lewandowski, S. M., Cunningham, R. K., Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code, Proceedings of the 2003 ACM Workshop on Rapid Malcode (WORM), Washington, DC, pp. 76–82, October 2003.
(Full Paper)

Khazan, R. I., Lynch, N. A., An Algorithm for an Intermittently Atomic Data Service Based on Group Communication, Proceedings of the International Workshop on Large-Scale Group Communication, Florence, Italy, pp. 25–30, October 2003.
(Full Paper)

Khazan, R., A One-Round Algorithm for Virtually Synchronous Group Communication in Wide Area Networks, PhD dissertation. Department of Electrical Engineering and Computer Science, MIT, May 22, 2002.
(Abstract)

Keidar, I., Khazan, R., A Virtually Synchronous Group Multicast Algorithm for WANs: Formal Approach, SIAM Journal of Computing, Vol. 32, No. 1, pp. 78–130, 2002.
(Abstract)

Keidar, I., Khazan, R., Lynch, N., Shvartsman, A. An Inheritance-Based Technique for Building Simulation Proofs Incrementally. ACM Transactions on Software Engineering Methodology (TOSEM), Vol. 11, No. 1, January 2002, pp. 1–29.
(Abstract)

Keidar, I., Khazan, R., Lynch, N., Shvartsman, A., An Inheritance-Based Technique for Building Simulation Proofs Incrementally, 22nd International Conference on Software Engineering (ICSE), Limerick, Ireland, June 2000. (Conference version of KKLS-TOSEM-2002).
(Abstract)

Keidar, I., Khazan, R., A Client-Server Approach to Virtually Synchronous Group Multicast: Specifications and Algorithms, 20th International Conference on Distributed Computing Systems (ICDCS), April 2000. (Conference version of KK-SICOMP-2003).
(Abstract)

Khazan, R., Fekete, A., Lynch, N., Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service, 12th International Symposium on Distributed Computing (DISC '98).
(Abstract)

Khazan, R., Group Communication as a Base for a Load-Balancing Replicated Data Service, Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts, May 1998.
(Abstract)

Cohn M., Khazan, R., Parsing with Suffix and Prefix Dictionaries, Proc. Data Compression Conference (DCC '96) March 31–April 3, 1996, Snowbird, Utah, IEEE Computer Society Press, Los Alamitos, California.
(Abstract)

 

top of page