Luke Valenta

PhD student, applied cryptography and computer security researcher

Interests

Computer Security, Privacy, Applied Cryptography, Elliptic Curve Cryptography, Distributed Systems

Education

Sep 2014 - May 2019 (expected) University of Pennsylvania

Sep 2014 - May 2016 University of Pennsylvania

Sep 2011 - May 2014 University of Maryland

Sep 2009 - May 2011 Frostburg State University

Industry Experience

May 2018 - Jul 2018 Cryptography Engineering Intern, Cloudflare

Jun 2017 - Aug 2017 Ph.D. Intern, Advanced Security Research Group, Cisco Systems

Publications

A list is also available on Google Scholar.

IMC 2018 403 Forbidden: A Global View of CDN Geoblocking. Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
EuroS&P 2018 In search of CurveSwap: Measuring elliptic curve implementations in the wild. Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger.
CCS 2017 May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. Daniel Genkin, Luke Valenta, Yuval Yarom.
PQCrypto 2017 Post-quantum RSA. Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta.
NDSS 2017 Measuring small subgroup attacks against Diffie-Hellman. Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger.
USENIX 2016 DROWN: Breaking TLS using SSLv2. Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt. (site)
FC 2016 Factoring as a Service. Luke Valenta, Shaanan Cohney, Joshua Fried, Satya Boddulari, Nadia Heninger. (site)
CCS 2015 Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin, and Paul Zimmermann. Best paper award. (site)
SIGCOMM 2015 Alibi Routing. Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee. (site)
BITCOIN 2015 Blindcoin: Blinded, Accountable Mixes for Bitcoin. Luke Valenta, Brendan Rowan.

Languages

Go, Python, C, C++, Java, Ruby, MatLab, OCaml, LaTex, HTML

Operating Systems

UNIX, Linux, Android

Awards

Oct 2016 Finalist, Facebook Internet Defense Prize
Aug 2016 Pwnie Award - Best Cryptographic Attack, Black Hat
Oct 2015 Best Paper Award, ACM CCS
Aug 2015 Pwnie Award - Most Innovative Research, Black Hat
Sep 2013 Philip Merrill Presidential Scholar
Sep 2013 John D. Gannon Scholarship
Sep 2012 - May 2013 University of Maryland Computer Science Departmental Honors
Sep 2012 Jeffrey C. and Sandra W. Huskamp Computer Science Scholarship
Sep 2012 Honor Society of Phi Kappa Phi, College Park Chapter
Sep 2010 Kappa Mu Epsilon Mathematics Honor Society
Sep 2011 - May 2014 Dean’s List, University of Maryland
Sep 2009 - May 2011 Dean’s List, Frostburg State University

Academic Services

USENIX 2019 28th Usenix Security Symposium, program committee
FC 2019 Financial Cryptography and Data Security, program committee
BITCOIN 2018 Workshop on Bitcoin and Blockchain Research, program committee
BITCOIN 2017 Workshop on Bitcoin and Blockchain Research, program committee
PETS 2017.4 Privacy Enhancing Technologies, external reviewer

Other Services

2017 - 2018 Computer and Information Science Graduate Association, University of Pennsylvania, co-chair
2016 - 2017 Graduate Student Engineering Group, University of Pennsylvania, president
2015 - 2016 Graduate Student Engineering Group, University of Pennsylvania, vice president
2014 - present Security Lab, University of Pennsylvania, sysadmin
2014 - present Security Reading Group, University of Pennsylvania, organizer

Conference Talks

EuroS&P 2018 In search of CurveSwap: Measuring elliptic curve implementations in the wild. (slides)
CCS 2017 May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. (slides) (video)
NDSS 2017 Measuring small subgroup attacks against Diffie-Hellman. (slides) (video)
FC 2016 Factoring as a Service. (slides)
BITCOIN 2015 Blindcoin: Blinded, Accountable Mixes for Bitcoin. (slides)

Other Talks

Nov 2016 Factoring as a Service. Boston University Security Group.
Mar 2015 How Bitcoin Works. Net Tuesday Philly Meetup. (slides)

Teaching

Fall 2017 CIS551: Computer and Network Security, University of Pennsylvania, TA
Fall 2016 CIS551: Computer and Network Security, University of Pennsylvania, TA
Spring 2016 CIS331: Computer Security, University of Pennsylvania, TA
Fall 2015 CIS556: Cryptography, University of Pennsylvania, TA
Fall 2013 CMSC216: Introduction to Computer Systems, University of Maryland, TA
Fall 2010 - Spring 2011 MATH237: Calculus II, Frostburg State University, tutor
Fall 2010 - Spring 2011 MATH236: Calculus I, Frostburg State University, tutor

Relevant Coursework

Computer Networks, Algorithms, Programming Handheld Devices, Network Security, Programming Languages, Cryptography, Computer Architecture, Discrete Structures, Computer Systems, Object Oriented Programming, Machine Learning

Additional activities

Nov 2014, Nov 2016 Mr. and Mrs. Penn Bodybuilding Competition, participant
Sep 2011 - May 2014 UMD Gymkana Troupe (gymnastics), member
Sep 2013 PennApps Hackathon, participant
Nov 2012 ACM Mid-Atlantic Regional Programming Contest, ninth place
Sep 2012 - May 2014 UMD Mobile Applications Developers Club, member