BibTeX records: Amit A. Levy

download as .bib file

@inproceedings{DBLP:conf/kisv/SchuermannTL23,
  author       = {Leon Schuermann and
                  Arun Thomas and
                  Amit Levy},
  title        = {Encapsulated Functions: Fortifying Rust's {FFI} in Embedded Systems},
  booktitle    = {Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification,
                  {KISV} 2023, Koblenz, Germany, 23 October 2023},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3625275.3625397},
  doi          = {10.1145/3625275.3625397},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kisv/SchuermannTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/LiuLNB23,
  author       = {David H. Liu and
                  Amit Levy and
                  Shadi A. Noghabi and
                  Sebastian Burckhardt},
  editor       = {Mahesh Balakrishnan and
                  Manya Ghobadi},
  title        = {Doing More with Less: Orchestrating Serverless Applications without
                  an Orchestrator},
  booktitle    = {20th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 2023, Boston, MA, April 17-19, 2023},
  pages        = {1505--1519},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/nsdi23/presentation/liu-david},
  timestamp    = {Thu, 11 May 2023 17:08:22 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/LiuLNB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TorokL23,
  author       = {Ryan Torok and
                  Amit Levy},
  title        = {Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive
                  Browser Fingerprinting Defense},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1023--1040},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179385},
  doi          = {10.1109/SP46215.2023.10179385},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TorokL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/AyersDLLPWW22,
  author       = {Hudson Ayers and
                  Prabal Dutta and
                  Philip Alexander Levis and
                  Amit Levy and
                  Pat Pannuto and
                  Johnathan Van Why and
                  Jean{-}Luc Watson},
  editor       = {Martina Lindorfer and
                  Jason Polakis},
  title        = {Tiered trust for useful embedded systems security},
  booktitle    = {EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on
                  Systems Security, Rennes, France, April 5-8, 2022},
  pages        = {15--21},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517208.3523752},
  doi          = {10.1145/3517208.3523752},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/AyersDLLPWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/DengMLW22,
  author       = {Yuhan Deng and
                  Angela Montemayor and
                  Amit Levy and
                  Keith Winstein},
  title        = {Computation-centric networking},
  booktitle    = {Proceedings of the 21st {ACM} Workshop on Hot Topics in Networks,
                  HotNets 2022, Austin, Texas, November 14-15, 2022},
  pages        = {167--173},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3563766.3564106},
  doi          = {10.1145/3563766.3564106},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/DengMLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LiKFLL22,
  author       = {Nanqinqin Li and
                  Anja Kalaba and
                  Michael J. Freedman and
                  Wyatt Lloyd and
                  Amit Levy},
  editor       = {Jiri Schindler and
                  Noa Zilberman},
  title        = {Speculative Recovery: Cheap, Highly Available Fault Tolerance with
                  Disaggregated Storage},
  booktitle    = {2022 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2022, Carlsbad,
                  CA, USA, July 11-13, 2022},
  pages        = {271--286},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/atc22/presentation/li-nanqinqin},
  timestamp    = {Wed, 12 Oct 2022 11:32:17 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/LiKFLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/PopescuXAAL21,
  author       = {Natalie Popescu and
                  Ziyang Xu and
                  Sotiris Apostolakis and
                  David I. August and
                  Amit Levy},
  title        = {Safer at any speed: automatic context-aware safety enhancement for
                  Rust},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {5},
  number       = {{OOPSLA}},
  pages        = {1--23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485480},
  doi          = {10.1145/3485480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/PopescuXAAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/ChiangAGLL21,
  author       = {Holly Chiang and
                  Hudson Ayers and
                  Daniel B. Giffin and
                  Amit Levy and
                  Philip Alexander Levis},
  editor       = {Polly Huang and
                  Marco Zuniga and
                  Guoliang Xing and
                  Chiara Petrioli},
  title        = {Power Clocks: Dynamic Multi-Clock Management for Embedded Systems},
  booktitle    = {{EWSN} '21: Proceedings of the 2021 International Conference on Embedded
                  Wireless Systems and Networks, Delft, The Netherlands, 17-19 February
                  2021},
  pages        = {139--150},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://dl.acm.org/doi/10.5555/3451271.3451284},
  doi          = {10.5555/3451271.3451284},
  timestamp    = {Wed, 04 May 2022 13:03:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/ChiangAGLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Helt0LL21,
  author       = {Jeffrey Helt and
                  Matthew Burke and
                  Amit Levy and
                  Wyatt Lloyd},
  editor       = {Robbert van Renesse and
                  Nickolai Zeldovich},
  title        = {Regular Sequential Serializability and Regular Sequential Consistency},
  booktitle    = {{SOSP} '21: {ACM} {SIGOPS} 28th Symposium on Operating Systems Principles,
                  Virtual Event / Koblenz, Germany, October 26-29, 2021},
  pages        = {163--179},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3477132.3483566},
  doi          = {10.1145/3477132.3483566},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/Helt0LL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-08930,
  author       = {Jeffrey Helt and
                  Matthew Burke and
                  Amit Levy and
                  Wyatt Lloyd},
  title        = {Regular Sequential Serializability and Regular Sequential Consistency},
  journal      = {CoRR},
  volume       = {abs/2109.08930},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.08930},
  eprinttype    = {arXiv},
  eprint       = {2109.08930},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-08930.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-13319,
  author       = {Yue Tan and
                  David Liu and
                  Nanqinqin Li and
                  Amit Levy},
  title        = {How Low Can You Go? Practical cold-start performance limits in FaaS},
  journal      = {CoRR},
  volume       = {abs/2109.13319},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.13319},
  eprinttype    = {arXiv},
  eprint       = {2109.13319},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-13319.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/AyersCTMLL20,
  author       = {Hudson Ayers and
                  Paul Crews and
                  Hubert Teo and
                  Conor McAvity and
                  Amit Levy and
                  Philip Alexander Levis},
  title        = {Design Considerations for Low Power Internet Protocols},
  booktitle    = {16th International Conference on Distributed Computing in Sensor Systems,
                  {DCOSS} 2020, Marina del Rey, CA, USA, May 25-27, 2020},
  pages        = {103--111},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DCOSS49796.2020.00027},
  doi          = {10.1109/DCOSS49796.2020.00027},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/AyersCTMLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DisselkoenRWGLS19,
  author       = {Craig Disselkoen and
                  John Renner and
                  Conrad Watt and
                  Tal Garfinkel and
                  Amit Levy and
                  Deian Stefan},
  title        = {Position Paper: Progressive Memory Safety for WebAssembly},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337171},
  doi          = {10.1145/3337167.3337171},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DisselkoenRWGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Levy18,
  author       = {Amit A. Levy},
  title        = {A secure operating system for the internet of things},
  school       = {Stanford University, {USA}},
  year         = {2018},
  url          = {https://searchworks.stanford.edu/view/12739836},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Levy18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/HongLRL18,
  author       = {James Hong and
                  Amit Levy and
                  Laurynas Riliskis and
                  Philip Alexander Levis},
  title        = {Don't Talk Unless {I} Say So! Securing the Internet of Things with
                  Default-Off Networking},
  booktitle    = {2018 {IEEE/ACM} Third International Conference on Internet-of-Things
                  Design and Implementation, IoTDI 2018, Orlando, FL, USA, April 17-20,
                  2018},
  pages        = {117--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IoTDI.2018.00021},
  doi          = {10.1109/IOTDI.2018.00021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotdi/HongLRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/AyersCTMLL18,
  author       = {Hudson Ayers and
                  Paul Thomas Crews and
                  Hubert Hua Kian Teo and
                  Conor McAvity and
                  Amit Levy and
                  Philip Alexander Levis},
  editor       = {Gowri Sankar Ramachandran and
                  Bhaskar Krishnamachari},
  title        = {Design Considerations for Low Power Internet Protocols},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Embedded Networked Sensor
                  Systems, SenSys 2018, Shenzhen, China, November 4-7, 2018},
  pages        = {317--318},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274783.3275161},
  doi          = {10.1145/3274783.3275161},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/AyersCTMLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ChiangGLL18,
  author       = {Holly Chiang and
                  Daniel B. Giffin and
                  Amit Levy and
                  Philip Alexander Levis},
  editor       = {Gowri Sankar Ramachandran and
                  Bhaskar Krishnamachari},
  title        = {Dynamic Multi-Clock Management for Embedded Systems},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Embedded Networked Sensor
                  Systems, SenSys 2018, Shenzhen, China, November 4-7, 2018},
  pages        = {347--348},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274783.3275176},
  doi          = {10.1145/3274783.3275176},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/ChiangGLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-10751,
  author       = {Hudson Ayers and
                  Paul Crews and
                  Hubert Teo and
                  Conor McAvity and
                  Amit Levy and
                  Philip Alexander Levis},
  title        = {Design Considerations for Low Power Internet Protocols},
  journal      = {CoRR},
  volume       = {abs/1806.10751},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.10751},
  eprinttype    = {arXiv},
  eprint       = {1806.10751},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-10751.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GiffinLSTMMR17,
  author       = {Daniel B. Giffin and
                  Amit Levy and
                  Deian Stefan and
                  David Terei and
                  David Mazi{\`{e}}res and
                  John C. Mitchell and
                  Alejandro Russo},
  title        = {Hails: Protecting data privacy in untrusted web applications},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {4-5},
  pages        = {427--461},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-15801},
  doi          = {10.3233/JCS-15801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GiffinLSTMMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/LevyCGPDL17,
  author       = {Amit Levy and
                  Bradford Campbell and
                  Branden Ghena and
                  Pat Pannuto and
                  Prabal Dutta and
                  Philip Alexander Levis},
  title        = {The Case for Writing a Kernel in Rust},
  booktitle    = {Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India,
                  September 2, 2017},
  pages        = {1:1--1:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3124680.3124717},
  doi          = {10.1145/3124680.3124717},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsys/LevyCGPDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/LevyCGGLPDL17,
  author       = {Amit Levy and
                  Bradford Campbell and
                  Branden Ghena and
                  Daniel B. Giffin and
                  Shane Leonard and
                  Pat Pannuto and
                  Prabal Dutta and
                  Philip Alexander Levis},
  editor       = {M. Rasit Eskicioglu},
  title        = {The Tock Embedded Operating System},
  booktitle    = {Proceedings of the 15th {ACM} Conference on Embedded Network Sensor
                  Systems, SenSys 2017, Delft, Netherlands, November 06-08, 2017},
  pages        = {45:1--45:2},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131672.3136988},
  doi          = {10.1145/3131672.3136988},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/LevyCGGLPDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/LevyCGGPDL17,
  author       = {Amit Levy and
                  Bradford Campbell and
                  Branden Ghena and
                  Daniel B. Giffin and
                  Pat Pannuto and
                  Prabal Dutta and
                  Philip Alexander Levis},
  title        = {Multiprogramming a 64kB Computer Safely and Efficiently},
  booktitle    = {Proceedings of the 26th Symposium on Operating Systems Principles,
                  Shanghai, China, October 28-31, 2017},
  pages        = {234--251},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132747.3132786},
  doi          = {10.1145/3132747.3132786},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sosp/LevyCGGPDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BalajiCLLMRSYBC17,
  author       = {Bharathan Balaji and
                  Bradford Campbell and
                  Amit Levy and
                  Xiaozhou Li and
                  Addison Mayberry and
                  Nirupam Roy and
                  Vasuki Narasimha Swamy and
                  Longqi Yang and
                  Victor Bahl and
                  Ranveer Chandra and
                  Ratul Mahajan},
  title        = {Modeling Actuation Constraints for IoT Applications},
  journal      = {CoRR},
  volume       = {abs/1701.01894},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.01894},
  eprinttype    = {arXiv},
  eprint       = {1701.01894},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BalajiCLLMRSYBC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LevyCB16,
  author       = {Amit Levy and
                  Henry Corrigan{-}Gibbs and
                  Dan Boneh},
  title        = {Stickler: Defending against Malicious Content Distribution Networks
                  in an Unmodified Browser},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {22--28},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.32},
  doi          = {10.1109/MSP.2016.32},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LevyCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/HongLL16,
  author       = {James Hong and
                  Amit A. Levy and
                  Philip Alexander Levis},
  editor       = {Rajesh Krishna Balan and
                  Archan Misra and
                  Landon P. Cox and
                  Yutaka Arakawa and
                  Xia Zhou and
                  Robert LiKamWa},
  title        = {Demo: Building Comprehensible Access Control for the Internet of Things
                  using Beetle},
  booktitle    = {Proceedings of the 14th Annual International Conference on Mobile
                  Systems, Applications, and Services Companion, Singapore, Singapore,
                  June 25-30, 2016},
  pages        = {102},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2938559.2938578},
  doi          = {10.1145/2938559.2938578},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/HongLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/LevyHRLW16,
  author       = {Amit A. Levy and
                  James Hong and
                  Laurynas Riliskis and
                  Philip Alexander Levis and
                  Keith Winstein},
  editor       = {Rajesh Krishna Balan and
                  Archan Misra and
                  Sharad Agarwal and
                  Cecilia Mascolo},
  title        = {Beetle: Flexible Communication for Bluetooth Low Energy},
  booktitle    = {Proceedings of the 14th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2016, Singapore, June
                  26-30, 2016},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2906388.2906414},
  doi          = {10.1145/2906388.2906414},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/LevyHRLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/LevyCGLPLD16,
  author       = {Amit A. Levy and
                  Bradford Campbell and
                  Branden Ghena and
                  Shane Leonard and
                  Pat Pannuto and
                  Philip Alexander Levis and
                  Prabal Dutta},
  editor       = {Philip Alexander Levis and
                  Steve Eglash and
                  Lama Nachman and
                  Anthony Rowe},
  title        = {Rebooting the Embedded System: Demo Abstract},
  booktitle    = {Proceedings of the 14th {ACM} Conference on Embedded Network Sensor
                  Systems, SenSys 2016, Stanford, CA, USA, November 14-16, 2016},
  pages        = {314--315},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994551.2996539},
  doi          = {10.1145/2994551.2996539},
  timestamp    = {Tue, 23 May 2023 07:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/LevyCGLPLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/LevyACCDGLP15,
  author       = {Amit A. Levy and
                  Michael P. Andersen and
                  Bradford Campbell and
                  David E. Culler and
                  Prabal Dutta and
                  Branden Ghena and
                  Philip Alexander Levis and
                  Pat Pannuto},
  editor       = {Shan Lu},
  title        = {Ownership is theft: experiences building an embedded {OS} in rust},
  booktitle    = {Proceedings of the 8th Workshop on Programming Languages and Operating
                  Systems, {PLOS} 2015, Monterey, California, USA, October 4, 2015},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818302.2818306},
  doi          = {10.1145/2818302.2818306},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sosp/LevyACCDGLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TereiL15,
  author       = {David Terei and
                  Amit A. Levy},
  title        = {Blade: {A} Data Center Garbage Collector},
  journal      = {CoRR},
  volume       = {abs/1504.02578},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.02578},
  eprinttype    = {arXiv},
  eprint       = {1504.02578},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TereiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LevyCB15,
  author       = {Amit Levy and
                  Henry Corrigan{-}Gibbs and
                  Dan Boneh},
  title        = {Stickler: Defending Against Malicious CDNs in an Unmodified Browser},
  journal      = {CoRR},
  volume       = {abs/1506.04110},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.04110},
  eprinttype    = {arXiv},
  eprint       = {1506.04110},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LevyCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haskell/LevyTSM14,
  author       = {Amit A. Levy and
                  David Terei and
                  Deian Stefan and
                  David Mazi{\`{e}}res},
  editor       = {Wouter Swierstra},
  title        = {Demo proposal: making web applications -XSafe},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGPLAN} symposium on Haskell, Gothenburg,
                  Sweden, September 4-5, 2014},
  pages        = {91},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2633357.2633373},
  doi          = {10.1145/2633357.2633373},
  timestamp    = {Thu, 24 Jun 2021 16:19:29 +0200},
  biburl       = {https://dblp.org/rec/conf/haskell/LevyTSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haskell/StefanLRM14,
  author       = {Deian Stefan and
                  Amit Levy and
                  Alejandro Russo and
                  David Mazi{\`{e}}res},
  editor       = {Wouter Swierstra},
  title        = {Building secure systems with {LIO} (demo)},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGPLAN} symposium on Haskell, Gothenburg,
                  Sweden, September 4-5, 2014},
  pages        = {93--94},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2633357.2633371},
  doi          = {10.1145/2633357.2633371},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haskell/StefanLRM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/PannutoABCLCLD14,
  author       = {Pat Pannuto and
                  Michael P. Andersen and
                  Tom Bauer and
                  Bradford Campbell and
                  Amit Levy and
                  David E. Culler and
                  Philip Alexander Levis and
                  Prabal Dutta},
  editor       = {{\'{A}}kos L{\'{e}}deczi and
                  Prabal Dutta and
                  Chenyang Lu},
  title        = {A networked embedded system platform for the post-mote era},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Embedded Network Sensor
                  Systems, SenSys '14, Memphis, Tennessee, USA, November 3-6, 2014},
  pages        = {354--355},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668332.2668364},
  doi          = {10.1145/2668332.2668364},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/PannutoABCLCLD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StefanBYLTRM13,
  author       = {Deian Stefan and
                  Pablo Buiras and
                  Edward Z. Yang and
                  Amit Levy and
                  David Terei and
                  Alejandro Russo and
                  David Mazi{\`{e}}res},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {718--735},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_40},
  doi          = {10.1007/978-3-642-40203-6\_40},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/StefanBYLTRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/BuirasLSRM13,
  author       = {Pablo Buiras and
                  Amit Levy and
                  Deian Stefan and
                  Alejandro Russo and
                  David Mazi{\`{e}}res},
  editor       = {Mart{\'{\i}}n Abadi and
                  Alberto Lluch{-}Lafuente},
  title        = {A Library for Removing Cache-Based Attacks in Concurrent Information
                  Flow Systems},
  booktitle    = {Trustworthy Global Computing - 8th International Symposium, {TGC}
                  2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8358},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05119-2\_12},
  doi          = {10.1007/978-3-319-05119-2\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/BuirasLSRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/StefanRBLMM12,
  author       = {Deian Stefan and
                  Alejandro Russo and
                  Pablo Buiras and
                  Amit Levy and
                  John C. Mitchell and
                  David Mazi{\`{e}}res},
  editor       = {Peter Thiemann and
                  Robby Bruce Findler},
  title        = {Addressing covert termination and timing channels in concurrent information
                  flow systems},
  booktitle    = {{ACM} {SIGPLAN} International Conference on Functional Programming,
                  ICFP'12, Copenhagen, Denmark, September 9-15, 2012},
  pages        = {201--214},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2364527.2364557},
  doi          = {10.1145/2364527.2364557},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfp/StefanRBLMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/GiffinLSTMMR12,
  author       = {Daniel B. Giffin and
                  Amit Levy and
                  Deian Stefan and
                  David Terei and
                  David Mazi{\`{e}}res and
                  John C. Mitchell and
                  Alejandro Russo},
  editor       = {Chandu Thekkath and
                  Amin Vahdat},
  title        = {Hails: Protecting Data Privacy in Untrusted Web Applications},
  booktitle    = {10th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2012, Hollywood, CA, USA, October 8-10, 2012},
  pages        = {47--60},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/osdi12/technical-sessions/presentation/giffin},
  timestamp    = {Tue, 02 Feb 2021 08:05:55 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/GiffinLSTMMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/GeambasuLKKL10,
  author       = {Roxana Geambasu and
                  Amit A. Levy and
                  Tadayoshi Kohno and
                  Arvind Krishnamurthy and
                  Henry M. Levy},
  editor       = {Remzi H. Arpaci{-}Dusseau and
                  Brad Chen},
  title        = {Comet: An active distributed key-value store},
  booktitle    = {9th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings},
  pages        = {323--336},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/osdi10/tech/full\_papers/Geambasu.pdf},
  timestamp    = {Thu, 12 Mar 2020 11:35:55 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/GeambasuLKKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GeambasuKLL09,
  author       = {Roxana Geambasu and
                  Tadayoshi Kohno and
                  Amit A. Levy and
                  Henry M. Levy},
  editor       = {Fabian Monrose},
  title        = {Vanish: Increasing Data Privacy with Self-Destructing Data},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {299--316},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/geambasu.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GeambasuKLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics