


default search action
Nickolai Zeldovich
Person information
- affiliation: Massachusetts Institute of Technology, Cambridge, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c89]Atalay Mert Ileri, Nickolai Zeldovich, Adam Chlipala, M. Frans Kaashoek:
Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism. CSF 2024: 96-111 - [c88]Anish Athalye
, Henry Corrigan-Gibbs
, M. Frans Kaashoek
, Joseph Tassarotti
, Nickolai Zeldovich
:
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation. SOSP 2024: 655-672 - 2023
- [c87]Anish Athalye
, M. Frans Kaashoek
, Nickolai Zeldovich
, Joseph Tassarotti
:
The K2 Architecture for Trustworthy Hardware Security Modules. KISV@SOSP 2023: 26-32 - [c86]Yun-Sheng Chang, Ralf Jung
, Upamanyu Sharma, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying vMVCC, a high-performance transaction library using multi-version concurrency control. OSDI 2023: 871-886 - [c85]Upamanyu Sharma
, Ralf Jung
, Joseph Tassarotti
, M. Frans Kaashoek
, Nickolai Zeldovich
:
Grove: a Separation-Logic Library for Verifying Distributed Systems. SOSP 2023: 113-129 - [c84]Alexandra Henzinger
, Emma Dauterman
, Henry Corrigan-Gibbs
, Nickolai Zeldovich
:
Private Web Search with Tiptoe. SOSP 2023: 396-416 - [i15]Upamanyu Sharma, Ralf Jung, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Grove: a Separation-Logic Library for Verifying Distributed Systems (Extended Version). CoRR abs/2309.03046 (2023) - [i14]Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich:
Private Web Search with Tiptoe. IACR Cryptol. ePrint Arch. 2023: 1438 (2023) - 2022
- [c83]Tej Chajed, Joseph Tassarotti, Mark Theng, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning. OSDI 2022: 447-463 - [c82]Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying Hardware Security Modules with Information-Preserving Refinement. OSDI 2022: 503-519 - [c81]Ludovic Barman, Moshe Kol, David Lazar, Yossi Gilad, Nickolai Zeldovich:
Groove: Flexible Metadata-Private Messaging. OSDI 2022: 735-750 - [c80]Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies. USENIX Security Symposium 2022: 4237-4254 - 2021
- [c79]Tej Chajed, Joseph Tassarotti, Mark Theng, Ralf Jung
, M. Frans Kaashoek, Nickolai Zeldovich:
GoJournal: a verified, concurrent, crash-safe journaling system. OSDI 2021: 423-439 - [c78]Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:
Compact Certificates of Collective Knowledge. SP 2021: 626-641 - [e2]Robbert van Renesse, Nickolai Zeldovich:
SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, Virtual Event / Koblenz, Germany, October 26-29, 2021. ACM 2021, ISBN 978-1-4503-8709-5 [contents] - 2020
- [j13]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. GetMobile Mob. Comput. Commun. 24(2): 34-38 (2020) - [j12]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. login Usenix Mag. 45(1) (2020) - [c77]Jonathan Behrens, Anton Cao, Cel Skeggs, Adam Belay, M. Frans Kaashoek, Nickolai Zeldovich:
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract. OSDI 2020: 1139-1154 - [i13]Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs. IACR Cryptol. ePrint Arch. 2020: 975 (2020) - [i12]Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:
Compact Certificates of Collective Knowledge. IACR Cryptol. ePrint Arch. 2020: 1568 (2020)
2010 – 2019
- 2019
- [c76]Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for the Algorand Cryptocurrency. NDSS 2019 - [c75]Eleftherios Ioannidis, M. Frans Kaashoek, Nickolai Zeldovich:
Extracting and Optimizing Formally Verified Code for Systems Programming. NFM 2019: 228-236 - [c74]Tej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Argosy: verifying layered storage systems with recovery refinement. PLDI 2019: 1054-1068 - [c73]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, Nickolai Zeldovich:
Notary: a device for secure transaction approval. SOSP 2019: 97-113 - [c72]David Lazar, Yossi Gilad, Nickolai Zeldovich:
Yodel: strong metadata security for voice calls. SOSP 2019: 211-224 - [c71]Tej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying concurrent, crash-safe systems with Perennial. SOSP 2019: 243-258 - 2018
- [c70]Frank Wang, James Mickens, Nickolai Zeldovich:
Veil: Private Browsing Semantics Without Browser-side Assistance. NDSS 2018 - [c69]Tej Chajed, M. Frans Kaashoek, Butler W. Lampson, Nickolai Zeldovich:
Verifying concurrent software using movers in CSPEC. OSDI 2018: 306-322 - [c68]Atalay Mert Ileri
, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Proving confidentiality in a file system using DiskSec. OSDI 2018: 323-338 - [c67]David Lazar, Yossi Gilad, Nickolai Zeldovich:
Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. OSDI 2018: 711-725 - [i11]Lillian Tsai, Eddie Kohler, M. Frans Kaashoek, Nickolai Zeldovich:
A Revised and Verified Proof of the Scalable Commutativity Rule. CoRR abs/1809.09550 (2018) - [i10]Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for Cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 269 (2018) - 2017
- [j11]Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler:
Certifying a file system using crash hoare logic: correctness in the presence of crashes. Commun. ACM 60(4): 75-84 (2017) - [j10]Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich:
The scalable commutativity rule: designing scalable software for multicore processors. Commun. ACM 60(8): 83-90 (2017) - [c66]Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. SOSP 2017: 51-68 - [c65]Srivatsa S. Bhat, Rasha Eqbal, Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
Scaling a file system to many cores using an operation log. SOSP 2017: 69-86 - [c64]Haogang Chen, Tej Chajed, Alex Konradi, Stephanie Wang, Atalay Mert Ileri
, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying a high-performance crash-safe file system using a tree specification. SOSP 2017: 270-286 - [c63]Nirvan Tyagi
, Yossi Gilad, Derek Leung, Matei Zaharia
, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. SOSP 2017: 423-440 - [i9]Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. IACR Cryptol. ePrint Arch. 2017: 454 (2017) - 2016
- [j9]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama
:
A differential approach to undefined behavior detection. Commun. ACM 59(3): 99-106 (2016) - [c62]Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan:
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. NSDI 2016: 611-626 - [c61]David Lazar, Nickolai Zeldovich:
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. OSDI 2016: 571-586 - [c60]Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare Logic for Certifying the FSCQ File System. USENIX ATC 2016 - [i8]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - [i7]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building web applications on top of encrypted data using Mylar. IACR Cryptol. ePrint Arch. 2016: 893 (2016) - [i6]Nirvan Tyagi, Yossi Gilad, Matei Zaharia, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. IACR Cryptol. ePrint Arch. 2016: 943 (2016) - 2015
- [j8]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich, Robert T. Morris, Eddie Kohler:
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors. ACM Trans. Comput. Syst. 32(4): 10:1-10:47 (2015) - [j7]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama
:
A Differential Approach to Undefined Behavior Detection. ACM Trans. Comput. Syst. 33(1): 1:1-1:29 (2015) - [j6]Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Tool for Parsing and Generating Data Formats. login Usenix Mag. 40(1) (2015) - [c59]Charles Gruenwald III, Filippo Sironi, M. Frans Kaashoek, Nickolai Zeldovich:
Hare: a file system for non-cache-coherent multicores. EuroSys 2015: 30:1-30:16 - [c58]Tej Chajed, Jon Gjengset, Jelle van den Hooff, M. Frans Kaashoek, James Mickens, Robert Morris, Nickolai Zeldovich:
Amber: Decoupling User Data from Web Applications. HotOS 2015 - [c57]Haogang Chen, Daniel Ziegler, Adam Chlipala, M. Frans Kaashoek, Eddie Kohler, Nickolai Zeldovich:
Specifying Crash Safety for Storage Systems. HotOS 2015 - [c56]Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare logic for certifying the FSCQ file system. SOSP 2015: 18-37 - [c55]Jelle van den Hooff, David Lazar, Matei Zaharia
, Nickolai Zeldovich:
Vuvuzela: scalable private messaging resistant to traffic analysis. SOSP 2015: 137-152 - [i5]Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan:
Guidelines for Using the CryptDB System Securely. IACR Cryptol. ePrint Arch. 2015: 979 (2015) - 2014
- [j5]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. login Usenix Mag. 39(4) (2014) - [c54]David Lazar, Haogang Chen, Xi Wang, Nickolai Zeldovich:
Why does cryptographic software fail?: a case study and open problems. APSys 2014: 7:1-7:7 - [c53]Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich:
VerSum: Verifiable Computations over Large Public Logs. CCS 2014: 1304-1316 - [c52]Raluca Ada Popa, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. NSDI 2014: 157-172 - [c51]Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock:
Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. OSDI 2014: 33-47 - [c50]Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Identifying Information Disclosure in Web Applications with Retroactive Auditing. OSDI 2014: 555-569 - [c49]Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Tool for Parsing and Generating Data Formats. OSDI 2014: 615-628 - [c48]Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Interface Generator for Data Formats. IEEE Symposium on Security and Privacy Workshops 2014: 158-166 - [e1]Garth Gibson, Nickolai Zeldovich:
Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014, Philadelphia, PA, USA, June 19-20, 2014. USENIX Association 2014 [contents] - 2013
- [j4]Stephen Tu, M. Frans Kaashoek, Samuel Madden, Nickolai Zeldovich:
Processing Analytical Queries over Encrypted Data. Proc. VLDB Endow. 6(5): 289-300 (2013) - [c47]Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Security bugs in embedded interpreters. APSys 2013: 17:1-17:7 - [c46]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Optimizing unit test execution in large software programs using dependency analysis. APSys 2013: 19:1-19:6 - [c45]Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, Srinivas Devadas:
Authenticated storage using small trusted hardware. CCSW 2013: 35-46 - [c44]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
How to Run Turing Machines on Encrypted Data. CRYPTO (2) 2013: 536-553 - [c43]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
RadixVM: scalable address spaces for multithreaded applications. EuroSys 2013: 211-224 - [c42]Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein:
Systematic Analysis of Defenses against Return-Oriented Programming. RAID 2013: 82-102 - [c41]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich, Robert T. Morris, Eddie Kohler:
The scalable commutativity rule: designing scalable software for multicore processors. SOSP 2013: 1-17 - [c40]Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich:
Asynchronous intrusion recovery for interconnected web services. SOSP 2013: 213-227 - [c39]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama
:
Towards optimization-safe systems: analyzing the impact of undefined behavior. SOSP 2013: 260-275 - [c38]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IEEE Symposium on Security and Privacy 2013: 463-477 - [c37]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Reusable garbled circuits and succinct functional encryption. STOC 2013: 555-564 - [c36]Taesoo Kim, Nickolai Zeldovich:
Practical and Effective Sandboxing for Non-root Users. USENIX ATC 2013: 139-144 - [i4]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IACR Cryptol. ePrint Arch. 2013: 129 (2013) - [i3]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Overcoming the Worst-Case Curse for Cryptographic Constructions. IACR Cryptol. ePrint Arch. 2013: 229 (2013) - [i2]Raluca A. Popa, Nickolai Zeldovich:
Multi-Key Searchable Encryption. IACR Cryptol. ePrint Arch. 2013: 508 (2013) - 2012
- [j3]Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: processing queries on an encrypted database. Commun. ACM 55(9): 103-111 (2012) - [c35]Xi Wang, Haogang Chen, Alvin Cheung
, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Undefined behavior: what happened to my code? APSys 2012: 9 - [c34]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Recovering from intrusions in distributed systems with DARE. APSys 2012: 10 - [c33]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
Scalable address spaces using RCU balanced trees. ASPLOS 2012: 199-210 - [c32]Aleksey Pesterev, Jacob Strauss, Nickolai Zeldovich, Robert T. Morris:
Improving network connection locality on multicore systems. EuroSys 2012: 337-350 - [c31]Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Improving Integer Security for Systems with KINT. OSDI 2012: 163-177 - [c30]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Efficient Patch-based Auditing for Web Application Vulnerabilities. OSDI 2012: 193-206 - [c29]Zviad Metreveli, Nickolai Zeldovich, M. Frans Kaashoek:
CPHASH: a cache-partitioned hash table. PPoPP 2012: 319-320 - [i1]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond. IACR Cryptol. ePrint Arch. 2012: 733 (2012) - 2011
- [j2]Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making information flow explicit in HiStar. Commun. ACM 54(11): 93-101 (2011) - [c28]Haogang Chen, Yandong Mao, Xi Wang, Dong Zhou, Nickolai Zeldovich, M. Frans Kaashoek:
Linux kernel vulnerabilities: state-of-the-art defenses and open problems. APSys 2011: 5 - [c27]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Retroactive auditing. APSys 2011: 9 - [c26]Carlo Curino, Evan P. C. Jones, Raluca A. Popa, Nirmesh Malviya, Eugene Wu, Samuel Madden, Hari Balakrishnan, Nickolai Zeldovich:
Relational Cloud: a Database Service for the cloud. CIDR 2011: 235-240 - [c25]Arjun Roy, Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Energy management in mobile devices with the cinder operating system. EuroSys 2011: 139-152 - [c24]Priya Gupta, Nickolai Zeldovich, Samuel Madden:
A Trigger-Based Middleware Cache for ORMs. Middleware 2011: 329-349 - [c23]Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: protecting confidentiality with encrypted query processing. SOSP 2011: 85-100 - [c22]Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich:
Intrusion recovery for database-backed web applications. SOSP 2011: 101-114 - [c21]Yandong Mao, Haogang Chen, Dong Zhou, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Software fault isolation with API integrity and multi-principal modules. SOSP 2011: 115-128 - [c20]Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi:
Secure In-Band Wireless Pairing. USENIX Security Symposium 2011 - [c19]Joseph Werther, Michael Zhivich, Tim Leek, Nickolai Zeldovich:
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. CSET 2011 - 2010
- [j1]Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. Comput. Commun. Rev. 40(1): 106-111 (2010) - [c18]Aleksey Pesterev, Nickolai Zeldovich, Robert T. Morris:
Locating cache performance bottlenecks using data profiling. EuroSys 2010: 335-348 - [c17]Silas Boyd-Wickizer, Austin T. Clements, Yandong Mao, Aleksey Pesterev, M. Frans Kaashoek, Robert Morris, Nickolai Zeldovich:
An Analysis of Linux Scalability to Many Cores. OSDI 2010: 1-16 - [c16]Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Intrusion Recovery Using Selective Re-execution. OSDI 2010: 89-104 - [c15]Silas Boyd-Wickizer, Nickolai Zeldovich:
Tolerating Malicious Device Drivers in Linux. USENIX ATC 2010 - [c14]Taesoo Kim, Nickolai Zeldovich:
Making Linux Protection Mechanisms Egalitarian with UserFS. USENIX Security Symposium 2010: 13-28 - [c13]Ramesh Chandra, Priya Gupta, Nickolai Zeldovich:
Separating Web Applications from User Data Storage with BSTORE. WebApps 2010
2000 – 2009
- 2009
- [c12]Jad Naous, Ryan Stutsman, David Mazières, Nick McKeown, Nickolai Zeldovich:
Delegating network security with more information. WREN 2009: 19-26 - [c11]Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. MobiHeld 2009: 49-54 - [c10]Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Improving application security with data flow assertions. SOSP 2009: 291-304 - [c9]Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich:
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. USENIX Security Symposium 2009: 267-282 - 2008
- [b1]Nickolai Zeldovich:
Securing untrustworthy software using information flow control. Stanford University, USA, 2008 - [c8]Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières:
Securing Distributed Systems with Information Flow Control. NSDI 2008: 293-308 - [c7]Nickolai Zeldovich, Hari Kannan, Michael Dalton, Christos Kozyrakis:
Hardware Enforcement of Application Security Policies Using Tagged Memory. OSDI 2008: 225-240 - 2006
- [c6]Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making Information Flow Explicit in HiStar. OSDI 2006: 263-278 - 2005
- [c5]Ramesh Chandra, Nickolai Zeldovich, Constantine P. Sapuntzakis, Monica S. Lam:
The Collective: A Cache-Based System Management Architecture. NSDI 2005 - [c4]Nickolai Zeldovich, Ramesh Chandra:
Interactive Performance Measurement with VNCPlay. USENIX ATC, FREENIX Track 2005: 189-198 - 2003
- [c3]Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum:
Virtual Appliances for Deploying and Maintaining Software. LISA 2003: 181-194 - [c2]