I am interested in censorship circumvention and censorship-resistant publishing with an emphasis on the implementation and real-world deployment of reliable and secure systems. I am also interested in formal methods and software engineering.
Cecylia Bocovich, John A. Doucette, Ian Goldberg. Lavinia: An audit-payment protocol for censorship-resistant storage. 21st International Conference on Financial Cryptography and Data Security (FC), April 2017.
Cecylia Bocovich, Joanne Atlee. Feature-Oriented Modelling in BIP: A Case Study. 2nd International Workshop on Model-Driven Engineering for Component-Based Software Systems (ModComp), October 2016.
Cecylia Bocovich, Ian Goldberg. Slitheen: Perfectly Imitated Decoy Routing Through Traffic Replacement. 23rd ACM Conference on Computer and Communications Security (CCS), October 2016.
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg. Leading Johnny to Water: Designing for Usability and Trust. 11th Symposium on Usable Privacy and Security (SOUPS), July 2015.
Cecylia Bocovich and Joanne M. Atlee.
Variable-Specific Resolutions for Feature Interactions.
In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2014), pages 553-563, 2014.
L.R. Biggers, C. Bocovich, R. Capshaw, B.P. Eddy, L.H. Etzkorn, and N.A. Kraft.
Configuring latent Dirichlet allocation based feature location.
In Empirical Software Engineering, 2012.
Cecylia Bocovich, Joanne Atlee. Feature-Oriented Modelling in BIP: A Case Study (extended version). Tech Report CS-2016-04, July 2016.
Cecylia Bocovich, John A. Doucette, Ian Goldberg. Lavinia: An audit-payment protocol for censorship-resistant storage (extended version). CACR Tech Report 2015-06, 2017.