Author of the publication

Shielding Applications from an Untrusted Cloud with Haven.

, , and . ACM Trans. Comput. Syst., 33 (3): 8:1-8:26 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Generation of Embedded Graphs and an Extension to Dobrushin Uniqueness (Extended Abstract)., and . STOC, page 176-185. ACM, (1998)The Darknet and the Future of Content Protection., , , and . Digital Rights Management, volume 2770 of Lecture Notes in Computer Science, Springer, (2003)'Go with the winners' Generators with Applications to Molecular Modeling., and . RANDOM, volume 1269 of Lecture Notes in Computer Science, page 135-149. Springer, (1997)Hard Graphs for Randomized Subgraph Exclusion Algorithms.. SWAT, volume 824 of Lecture Notes in Computer Science, page 278-289. Springer, (1994)Digital rights management for digital cinema., , and . Multim. Syst., 9 (3): 228-238 (2003)Fay: Extensible Distributed Tracing from Kernels to Clusters., , , , and . ACM Trans. Comput. Syst., 30 (4): 13:1-13:35 (2012)Hacking in Darkness: Return-oriented Programming against Secure Enclaves., , , , , , , , and . USENIX Security Symposium, page 523-539. USENIX Association, (2017)High-Resolution Side Channels for Untrusted Operating Systems., , and . USENIX Annual Technical Conference, page 299-312. USENIX Association, (2017)Fay: extensible distributed tracing from kernels to clusters., , , and . SOSP, page 311-326. ACM, (2011)STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud., , and . USENIX Security Symposium, page 189-204. USENIX Association, (2012)