Ariel Feldman

Assistant Professor of Computer Science at the University of Chicago

[GPG key (for masochists only)]

Department of Computer Science
Ryerson Hall, Room 161A
1100 East 58th Street
Chicago, IL 60637

About me [CV]

My research lies at the intersection of computer security and distributed systems. Topics that interest me include software and network security, data privacy, anonymity, and electronic voting. Recently, I've spent much of my time trying to find new ways to protect the security and privacy of users of “cloud hosted” services. I'm also particularly interested in the interaction between computer security, law, and public policy. I'm also a member of the Computer Science Department's CERES Center for Unstoppable Computing.

Before arriving at Chicago, I was a postdoc at the University of Pennsylvania's Department of Computer and Information Science where I was affiliated with the Security Laboratory and I worked with Jonathan Smith and Andreas Haeberlen. Before that, I received my Ph.D. from Princeton University's Computer Science Department where I was affiliated with the Security Research Group and the Center for Information Technology Policy. My advisor was Ed Felten, and I worked with Mike Freedman.



  • Galen Harrison (Ph.D. student)
  • Minhaj Us Salam Khan (Ph.D. student)
  • Min Xu (Ph.D. student)
  • Diego Bejarano (undergraduate)
  • Euirim Choi (undergraduate)
  • Nathaniel Verhaaren (undergraduate)
  • Julia Xu (undergraduate)



Publications [Google Scholar]

  • Using Differential Privacy to Efficiently Mitigate Side Channels in Distributed Analytics [PDF]
    M. Xu, A. Papadimitriou, A. J. Feldman, and A. Haeberlen
    Proc. 11th European Workshop on Systems Security (Eurosec '18), March 2018.
  • StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption [PDF]
    B. Dickens III, H. S. Gunawi, A. J. Feldman, and H. Hoffmann
    Proc. 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '18), March 2018.
  • Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures [PDF]
    Z. Deng, A. J. Feldman, S. A. Kurtz, and F. T. Chong
    Proc. 44th International Symposium on Computer Architecture (ISCA '17), June 2017.
  • Verifiable Differential Privacy [PDF]
    A. Narayan, A. J. Feldman, A. Papadimitriou, and A. Haeberlen
    Proc. 2015 European Conference on Computer Systems (EuroSys '15), April 2015.
  • Verifying Computations with State [PDF, Extended PDF]
    B. Braun, A. J. Feldman, Z. Ren, S. Setty, A. J. Blumberg, and M. Walfish
    Proc. 24th ACM Symposium on Operating Systems Principles (SOSP '13), November 2013.
  • Privacy and Integrity are Possible in the Untrusted Cloud [PDF]
    A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten
    IEEE Data Engineering Bulletin, December 2012.
  • Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider [PDF]
    A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten
    Proc. 21st USENIX Security Symposium (Sec '12), August 2012.
    Awarded Best Student Paper
  • Privacy and Integrity in the Untrusted Cloud [PDF]
    A. J. Feldman
    Ph.D. Dissertation, Princeton University, June 2012.
  • SPORC: Group Collaboration using Untrusted Cloud Resources [PDF]
    A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten
    Proc. 9th Symposium on Operating Systems Design and Implementation (OSDI '10), October 2010.
  • On Subliminal Channels in Encrypt-on-Cast Voting Systems [PDF]
    A. J. Feldman and J. Benaloh
    Proc. 2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE '09), August 2009.
  • Can DREs Provide Long-Lasting Security?
    The Case of Return-Oriented Programming and the AVC Advantage
    S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham
    Proc. 2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE '09), August 2009.
  • Lest We Remember: Cold Boot Attacks on Encryption Keys [PDF, Web Site, CACM]
    J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten
    Proc. 17th USENIX Security Symposium (Sec '08), July 2008.
    Awarded Best Student Paper
  • AVC Advantage: Hardware Functional Specifications [PDF]
    J. A. Halderman and A. J. Feldman
    Princeton University Computer Science Technical Report TR-816-08, March 8, 2008.
  • Security Analysis of the Diebold AccuVote-TS Voting Machine [Workshop PDF, Original PDF, Web Site]
    A. J. Feldman, J. A. Halderman, and E. W. Felten
    Proc. 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07), August 2007.
  • Source Code Review of the Diebold Voting System [PDF]
    J. A. Calandrino, A. J. Feldman, J. A. Halderman, D. Wagner, H. Yu, and W. P. Zeller
    California Secretary of State's 2007 "Top-to-Bottom Review" of California's voting systems, July 2007.
  • Internet Filters: A Public Policy Report, Second Edition [PDF]
    M. Heins, C. Cho, and A. Feldman
    Brennan Center for Justice at NYU School of Law, Free Expression Policy Project, May 2006.