Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Analysis of Defenses against Return-Oriented Programming., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 82-102. Springer, (2013)Hardware Enforcement of Application Security Policies Using Tagged Memory., , , and . OSDI, page 225-240. USENIX Association, (2008)VerSum: Verifiable Computations over Large Public Logs., , and . ACM Conference on Computer and Communications Security, page 1304-1316. ACM, (2014)Aardvark: A Concurrent Authenticated Dictionary with Short Proofs., , , , and . IACR Cryptol. ePrint Arch., (2020)Building Web Applications on Top of Encrypted Data Using Mylar., , , , , and . NSDI, page 157-172. USENIX Association, (2014)Private Web Search with Tiptoe., , , and . SOSP, page 396-416. ACM, (2023)Groove: Flexible Metadata-Private Messaging., , , , and . OSDI, page 735-750. USENIX Association, (2022)Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning., , , , and . OSDI, page 447-463. USENIX Association, (2022)Verifying vMVCC, a high-performance transaction library using multi-version concurrency control., , , , , and . OSDI, page 871-886. USENIX Association, (2023)Nail: A Practical Tool for Parsing and Generating Data Formats., and . OSDI, page 615-628. USENIX Association, (2014)