Selected press coverage of my work
- Coindesk. Ari Juels. Op-Ed: NFTs Can and Will be So Much More. 7 September 2022. (Op-ed on the future of NFTs.)
- Time. Andrew R. Chow. How Blockchain Could Solve the Problem of Digital Identity. 27 January 2022. (Includes my comments on the risks of vote buying, a subject of my research.)
- CoinDesk. Aoyon Ashraf and Eliza Gkritsi. Witnesses Debate Crypto Mining’s Efficiency in Congressional Hearing on Environment. 20 January 2022. (Article discussing my Congressional testimony on Bitcoin energy consumption.)
- Popular Science. Charlotte Hu. A beginners guide to how cryptocurrencies work From Bitcoin to blockchain, here’s what to know. 15 November 2021.
- Barron’s. Daren Fonda. Inside DeFi, the Wild West of Cryptocurrency. 31 October 2021.
- Bloomberg. Olga Kharif. Robot Crypto Traders Are the New Flash Boys. 23 September 2021. (Article on arbitrage bots.)
- Coindesk. Ari Juels, Ittay Eyal, and Mahimna Kelkar. Op-Ed: Miners, Front-Running-as-a-Service Is Theft. 7 April 2021. (Op-ed on front-running in blockchains.)
- Wired. Gregory Barber. As Digital Currency’s Popularity Rises, So Do Privacy Fears. 16 March 2021. (Article referencing IC3 paper on CBDC.)
- Forbes. Ben Jessel. Chainlink’s New Acquisition From Cornell University Could Transform Blockchain For Good. 29 August 2020. (Article on acquisition of DECO by Chainlink.)
- Wired. Gregory Barber. Microsoft Wants to Protect Your Identity With Bitcoin. 14 May 2019. (Article on self-sovereign identity management, with references to my group’s work on CHURP and oracles.)
- Bloomberg. Olga Kharif and Vildana Hajric. ‘Flash Boys’ Trading Bots Are Running Wild on Crypto Exchanges. 23 April 2019. (Article on research on cryptocurrency exchanges and arbitrage bots.)
- MIT Tech Review China. The whereabouts of 4 million bitcoins worldwide are unknown? This group of Cornell University scholars want to solve this problem | Exclusive interview. 30 March 2019. (Article on secret sharing scheme robust to “churn,” i.e., nodes coming and going.)
- MIT Technology Review. Mike Orcutt. Blockchain smart contracts are finally good for something in the real world. 19 November 2018. (Article on Chainlink that quotes me and discusses Town Crier.)
- Forbes. Darryn Pollock. Cornell’s Town Crier Acquired By Chainlink To Expand Decentralized Oracle Network. 1 November 2018. (Article about transfer of Town Crier to Chainlink.)
- Cornell Daily Sun. Matthew McGowen. Cornell Beats Other Ivies in Cryptocurrency Course Offerings. 13 Sept. 2018.
- Wired. Andrew Leonard. Meet the man with a radical plan for blockchain voting. 16 August 2018. (Article on blockchain voting that mentions my work on vote-buying.)
- Wired. Gregory Barber. Coinbase Doubles Down on the Future of Digital Identity. 15 August 2018.
- CoinDesk. Rachel Rose O’Leary. The `Dark DAO’ Threat: Vote Vulnerability Could Undermine Crypto Elections. 20 July 2018. (Article discussing my group’s blog post on attacking blockchain voting systems.)
- MIT Technology Review. Mike Orcutt. Meet Oasis Labs, the blockchain startup Silicon Valley is buzzing about. 12 July 2018. (Article that discusses my group’s Ekiden project and its use by Oasis Labs.)
- CoinDesk. Rachel Rose O’Leary. Sharding Is Ushering in Radical Ethereum Designs. 28 March 2018. (Article on GasToken / Project Chicago.)
- CNBC. Helen Zhao. Bitcoin and blockchain consume an exorbitant amount of energy: These engineers are trying to change that. 23 February 2018. (Article mentioning REM / Proof of Useful work.)
- Bitcoin Magazine. Amy Castor. Cornell IC3 Researchers Propose Solution to Bitcoin’s Multisig `Paralysis’ Problem. 19 January 2018. (Article on key-management research project.)
- CoinDesk. Rachel Rose O’Leary. Smarter Bug Bounties? Hydra Codes Creative Solution for Ethereum Theft. 2 November 2017. (Article on Hydra Project.)
- CoinDesk. Bailey Reutzel. Submarine Sends: IC3’s Plan to Clamp Down on ICO Cheats. 28 August 2017. (Article on blockchain confidentiality research.)
- Forbes. Amy Castor. Researchers Find Issues With 0x, An Ethereum-Based Project Aiming To Raise Millions In An ICO. 15 August 2017. (Article on cryptocurrency exchange research.)
- MIT Technology Review. Tom Simonite. How Encrypted Weather Data Could Help Corporate Blockchain Dreams Come True. 11 March 2017. (Article on Town Crier oracle.)
- Wired. Andy Greenberg. How to Steal an AI. 30 September 2016. (Coverage of research on ML model-extraction attacks.)
- MIT Technology Review. Tom Simonite. Computing Why Autocorrect for Passwords Is a Great Idea. 1 June 2016. (Coverage of research on typo correction for passwords.)
- MIT Technology Review. Tom Simonite. Technical Roadblock Might Shatter Bitcoin Dreams. 16 February 2016. (Article on Bitcoin scaling.)
- Nature / Scientific American. Andy Extance. Entrepreneurs Explore Bitcoin’s Future. 30 Sept. 2015. (Article mentions Permacoin and smart-contract research.)
- MIT Technology Review. Tom Simonite. Bitcoin’s Dark Side Could Get Darker. 13 August 2015. (Article on “Ring of Gyges” paper on criminal smart contracts.)
- Slashdot. The Best Way To Protect Real Passwords: Create Fake Ones. 12 May 2015. (Coverage of “NoCrack” project.)
- New Scientist. Aviva Rutkin. The Bitcoin Spin-Off Currency That’s Also an Archive. 12 June 2014. (Coverage of Permacoin.)
- Slashdot. Building Deception Into Encryption Software. 29 January 2014. (Coverage of “honey encryption” research.)
- BusinessWeek. Drake Bennett. To Thwart Hackers, Drown Them In Sweet, Sticky (Fake) Data. 30 January 2014.
- MIT Technology Review. Tom Simonite. `Honey Encryption’ Will Bamboozle Attackers with Fake Secrets. 29 January 2014. (Article on “honey encryption” research.)
- Forbes. Taylor Kubota. Security That Keeps Medical Implants Safe from Hackers. 23 October 2013. (Article on joint Rice Univ. / RSA Labs research on medical-device security.)
- Wall Street Journal. Daniel Akst. A Password for Implants. 4 Oct. 2013. (Article on joint Rice Univ. / RSA Labs research on medical-device security.)
- BusinessWeek. Drake Bennett. A Password Even a Hacker Supervillain Can’t Crack. 26 September 2013. (Article on joint Rice Univ. / RSA Labs research on medical-device security.)
- MIT Technology Review. David Talbot. Encrypted Heartbeats Keep Hackers from Medical Implants. 16 September 2013. (Article on joint Rice Univ. / RSA Labs research on medical-device security.)
- Slashdot. Honeywords: Honeypot Passwords. 8 May 2013. (Coverage of “honeywords” research project.)
- NBCNews. Fake ‘honeyword’ passwords could be planted to trip up hackers. 7 May 2013. (Article on “honeywords” research project.)
- Ars Technica. Amid a barrage of password breaches, ‘honeywords’ to the rescue. 6 May 2013. (Article on “honeywords” research project.)
- MIT Technology Review. Tom Simonite. How to Steal Data from Your Neighbor in the Cloud. 8 November 2012. (Article on joint Univ. of North Carolina / RSA Labs / Univ. of Wisconsin research on cloud security.)
- Slashdot. Attack Steals Crypto Key From Co-Located Virtual Machines. 6 November 2012. (Coverage of joint Univ. of North Carolina / RSA Labs / Univ. of Wisconsin research on cloud security.)
- MIT Technology Review. Tom Simonite. To Keep Passwords Safe from Hackers, Just Break Them into Bits. 9 October 2012. (Article on RSA product developed by RSA Labs.)
- MIT Technology Review. Erica Naone. Spotting Virtual Intruders. 9 March 2011. (Article on joint RSA Labs / Univ. of North Carolina work on side-channel based detection of unwanted cloud co-residency.)
- New Scientist. Kurt Kleiner. RFID tags get an intelligence upgrade. 14 August 2009. (Article on joint UMass / RSA Laboratories work on computational RFID tags.)
- Slashdot. Ben Rothke. Book Reviews: Tetraktys. 29 July 2009. (Review of my thriller novel Tetraktys.)
- Boston Globe. Mark Baard. RSA Labs scientist pens a tale of cybervillains. 20 July 2009. (Article about my thriller novel Tetraktys.)
- CNET. Vivian Yeo. Taking the Classical Approach to Security. 24 December 2008. (Interview on a range of topics.)
- MIT Technology Review. Erica Naone. Borderline Security. 31 October 2008. (Article on joint Univ. of Washington/RSA Laboratories analysis of Passport Cards and Enhanced Drivers Licenses.)
- Slashdot. Researchers Find Problems With RFID Passport Cards. 24 October 2008. (Article on joint Univ. of Washington/RSA Laboratories analysis of Passport Cards and Enhanced Drivers Licenses.)
- Wall Street Journal. Keith J. Winstein. Border-Crossing Cards Can Be Copied. 23 October 2008. (Article on joint Univ. of Washington/RSA Laboratories analysis of Passport Cards and Enhanced Drivers Licenses.)
- New York Times. Stephen Lawson. Researchers find problems with RFID passport cards. 23 October 2008. (Article on joint Univ. of Washington/RSA Laboratories analysis of Passport Cards and Enhanced Drivers Licenses.)
- Forbes. Andy Greenberg. In Pictures: Gadgets for Stopping Identity Theft. 14 May 2008. (Coverage of RSA Labs’ handset-based access-control system.)
- ComputerWorld. 40 Innovative IT People to Watch Under the Age of 40. 9 July 2007.
- New York Times. John Schwartz. Researchers See Pitfalls in No-Swipe Credit Cards. 23 October 2006. (Article on joint UMass-Amherst/RSA Laboratories analysis of RFID-enabled credit cards.)
- Consumer Reports. Andrea Rock. The End of Privacy. June 2006.
- Wired News. Annalee Newitz. The RFID Hacking Underground. 5 May 2006.
- National Public Radio, “All Things Considered.” Larry Abramson. High-Tech Passports Stir Concerns. 10 April 2005.
- eWeek. RSA Finds More Flaws in RFID. Jacqueline Emigh. 23 March 2005. (Article on this joint Johns Hopkins/RSA Labs reverse-engineering of a cryptographic RFID device used in many payment tokens and automobile immobilizers.)
- New York Times. John Schwartz. Graduate Cryptographers Unlock Code of ’Thiefproof’ Car Key. 29 January 2005. (Article on this joint Johns Hopkins/RSA Labs reverse-engineering of a cryptographic RFID device used in many payment tokens and automobile immobilizers.)
- Slashdot. Car RFID Security System Cracked. 29 January 2005. (Article on this joint Johns Hopkins/RSA Labs reverse-engineering of a cryptographic RFID device used in many payment tokens and automobile immobilizers.)
- MIT Technology Review. Innovators Under 35: Ari Juels. October 2004. List of the top 100 technology innovators in the world under 35 years of age. (Award is now called the TR35.)
- National Public Radio, “Morning Edition.” Radio Frequency IDs. Larry Abramson. (Discussion of co-invented RFID “blocker” tag and demonstration pharmacy.) 26 March 2004.
- Wired News. Kim Zetter. Jamming Tags Block RFID Scanners. 1 March 2004. (Article on RSA RFID “blocker” tag.)
- Information Week. Thomas Claburn. Watching Out: The closer RFID gets to consumers, the hotter privacy issues become. 8 March 2004.
- The New Scientist. Celeste Biever. RFID blocker tags may soothe privacy fears. 26 February 2004.
- Slashdot. RSA Creating RFID Blocker Tag. 24 February 2004.