1. GhostRider
2. Towards a theory of software protection and simulation by oblivious RAMs
3. E. Stefanov , M. Dijk , E. Shi , C. Fletcher , L. Ren , X. Yu and S. Devadas , Path ORAM: An Extremely Simple Oblivious RAM Protocol , in CCS , 2013 . E. Stefanov, M. Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu and S. Devadas, Path ORAM: An Extremely Simple Oblivious RAM Protocol, in CCS, 2013.
4. Fork Path: Batching ORAM Requests to Remove Redundant Memory Accesses
5. L. Ren , C. Fletcher , A. Kwon , E. Stefanov , E. Shi , M. Dijk and S. Devadas , Constants Count: Practical Improvements to Oblivious RAM , in USENIX Security , 2015 . L. Ren, C. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. Dijk and S. Devadas, Constants Count: Practical Improvements to Oblivious RAM, in USENIX Security, 2015.