Biblio

Export 31 results:
Filters: Author is Nickolai Zeldovich  [Clear All Filters]
2021
Chajed T, Tassarotti J, Theng M, Jung R, M. Kaashoek F, Zeldovich N.  2021.  GoJournal: a verified, concurrent, crash-safe journaling system. 15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21). :423--439.
2020
Behrens J, Cao A, Skeggs C, Belay A, M. Kaashoek F, Zeldovich N.  2020.  Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract. 14th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 20). :1139--1154.
2018
Lazar D, Gilad Y, Zeldovich N.  2018.  Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). :711--725.
Ileri A, Chajed T, Chlipala A, Kaashoek F, Zeldovich N.  2018.  Proving confidentiality in a file system using DiskSec. 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). :323--338.
Chajed T, Kaashoek F, Lampson B, Zeldovich N.  2018.  Verifying concurrent software using movers in CSPEC. 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). :306--322.
2016
Lazar D, Zeldovich N.  2016.  Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). :571--586.
Wang F, Mickens J, Zeldovich N, Vaikuntanathan V.  2016.  Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). :611--626.
Chen H, Ziegler D, Chajed T, Chlipala A, M. Kaashoek F, Zeldovich N.  2016.  Using Crash Hoare Logic for Certifying the FSCQ File System. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16).
2015
Chajed T, Gjengset J, van den Hooff J, M. Kaashoek F, Mickens J, Morris R, Zeldovich N.  2015.  Amber: Decoupling User Data from Web Applications. 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).
Chen H, Ziegler D, Chlipala A, M. Kaashoek F, Kohler E, Zeldovich N.  2015.  Specifying Crash Safety for Storage Systems. 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).
2014
Popa RAda, Stark E, Valdez S, Helfer J, Zeldovich N, Balakrishnan H.  2014.  Building Web Applications on Top of Encrypted Data Using Mylar. 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14). :157--172.
Chen H, Kim T, Wang X, Zeldovich N, M. Kaashoek F.  2014.  Identifying Information Disclosure in Web Applications with Retroactive Auditing. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :555--569.
Wang X, Lazar D, Zeldovich N, Chlipala A, Tatlock Z.  2014.  Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :33--47.
Bangert J, Zeldovich N.  2014.  Nail: A Practical Tool for Parsing and Generating Data Formats. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :615--628.
2013
Kim T, Zeldovich N.  2013.  Practical and Effective Sandboxing for Non-root Users. 2013 {USENIX} Annual Technical Conference ({USENIX} {ATC} 13). :139--144.
2012
Kim T, Chandra R, Zeldovich N.  2012.  Efficient Patch-based Auditing for Web Application Vulnerabilities. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :193--206.
Wang X, Chen H, Jia Z, Zeldovich N, M. Kaashoek F.  2012.  Improving Integer Security for Systems with KINT. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :163--177.
2011
Werther J, Zhivich M, Leek T, Zeldovich N.  2011.  Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. 4th Workshop on Cyber Security Experimentation and Test ({CSET} 11).
Gollakota S, Ahmed N, Zeldovich N, Katabi D.  2011.  Secure In-Band Wireless Pairing. 20th {USENIX} Security Symposium ({USENIX} Security 11).
2010
Boyd-Wickizer S, Clements AT, Mao Y, Pesterev A, M. Kaashoek F, Morris R, Zeldovich N.  2010.  An Analysis of Linux Scalability to Many Cores. 9th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 10).
Kim T, Wang X, Zeldovich N, M. Kaashoek F.  2010.  Intrusion Recovery Using Selective Re-execution. 9th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 10).
Kim T, Zeldovich N.  2010.  Making Linux Protection Mechanisms Egalitarian with UserFS. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Chandra R, Gupta P, Zeldovich N.  2010.  Separating Web Applications from User Data Storage with BSTORE. {USENIX} Conference on Web Application Development (WebApps 10).
Boyd-Wickizer S, Zeldovich N.  2010.  Tolerating Malicious Device Drivers in Linux. 2010 {USENIX} Annual Technical Conference ({USENIX} {ATC} 10).
2008
Zeldovich N, Kannan H, Dalton M, Kozyrakis C.  2008.  Hardware Enforcement of Application Security Policies Using Tagged Memory. 8th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 08).

Pages