scispace - formally typeset
S

Samuel Steffen

Researcher at ETH Zurich

Publications -  13
Citations -  204

Samuel Steffen is an academic researcher from ETH Zurich. The author has contributed to research in topics: Computer science & Information privacy. The author has an hindex of 5, co-authored 8 publications receiving 68 citations.

Papers
More filters
Proceedings ArticleDOI

zkay: Specifying and Enforcing Data Privacy in Smart Contracts

TL;DR: The zkay language is presented, which introduces privacy types defining owners of private values and automatically transforms them into contracts equivalent in terms of privacy and functionality, yet executable on public blockchains.
Proceedings ArticleDOI

Probabilistic Verification of Network Configurations

TL;DR: NetDice is introduced, the first scalable and accurate probabilistic network configuration analyzer supporting BGP, OSPF, ECMP, and static routes and automatically identifies a set of links whose failure is provably guaranteed not to change whether φ holds.
Proceedings ArticleDOI

λPSI: exact inference for higher-order probabilistic programs

TL;DR: It is shown that λPSI is practically effective—it automatically computes exact distributions for a number of interesting applications, from rational agents to information theory, many of which could so far only be handled approximately.
Proceedings ArticleDOI

DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers

TL;DR: DP-Sniper as mentioned in this paper is a black-box method that automatically finds violations of differential privacy by training a classifier to predict if an observed output was likely generated from one of two possible inputs, and transforming this classifier into an approximately optimal attack on differential privacy.
Proceedings ArticleDOI

ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs

TL;DR: The ZeeStar language and compiler allows developers to ergonomically specify privacy constraints using zkay’s privacy annotations and provably realizes these constraints by combining non-interactive zero-knowledge proofs and additively homomorphic encryption.