default search action
Nickolai Zeldovich
Person information
- affiliation: Massachusetts Institute of Technology, Cambridge, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c89]Atalay Mert Ileri, Nickolai Zeldovich, Adam Chlipala, M. Frans Kaashoek:
Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism. CSF 2024: 96-111 - [c88]Anish Athalye, Henry Corrigan-Gibbs, M. Frans Kaashoek, Joseph Tassarotti, Nickolai Zeldovich:
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation. SOSP 2024: 655-672 - 2023
- [c87]Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich, Joseph Tassarotti:
The K2 Architecture for Trustworthy Hardware Security Modules. KISV@SOSP 2023: 26-32 - [c86]Yun-Sheng Chang, Ralf Jung, Upamanyu Sharma, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying vMVCC, a high-performance transaction library using multi-version concurrency control. OSDI 2023: 871-886 - [c85]Upamanyu Sharma, Ralf Jung, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Grove: a Separation-Logic Library for Verifying Distributed Systems. SOSP 2023: 113-129 - [c84]Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich:
Private Web Search with Tiptoe. SOSP 2023: 396-416 - [i15]Upamanyu Sharma, Ralf Jung, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Grove: a Separation-Logic Library for Verifying Distributed Systems (Extended Version). CoRR abs/2309.03046 (2023) - [i14]Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich:
Private Web Search with Tiptoe. IACR Cryptol. ePrint Arch. 2023: 1438 (2023) - 2022
- [c83]Tej Chajed, Joseph Tassarotti, Mark Theng, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning. OSDI 2022: 447-463 - [c82]Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying Hardware Security Modules with Information-Preserving Refinement. OSDI 2022: 503-519 - [c81]Ludovic Barman, Moshe Kol, David Lazar, Yossi Gilad, Nickolai Zeldovich:
Groove: Flexible Metadata-Private Messaging. OSDI 2022: 735-750 - [c80]Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies. USENIX Security Symposium 2022: 4237-4254 - 2021
- [c79]Tej Chajed, Joseph Tassarotti, Mark Theng, Ralf Jung, M. Frans Kaashoek, Nickolai Zeldovich:
GoJournal: a verified, concurrent, crash-safe journaling system. OSDI 2021: 423-439 - [c78]Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:
Compact Certificates of Collective Knowledge. SP 2021: 626-641 - [e2]Robbert van Renesse, Nickolai Zeldovich:
SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, Virtual Event / Koblenz, Germany, October 26-29, 2021. ACM 2021, ISBN 978-1-4503-8709-5 [contents] - 2020
- [j13]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. GetMobile Mob. Comput. Commun. 24(2): 34-38 (2020) - [j12]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. login Usenix Mag. 45(1) (2020) - [c77]Jonathan Behrens, Anton Cao, Cel Skeggs, Adam Belay, M. Frans Kaashoek, Nickolai Zeldovich:
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract. OSDI 2020: 1139-1154 - [i13]Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs. IACR Cryptol. ePrint Arch. 2020: 975 (2020) - [i12]Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:
Compact Certificates of Collective Knowledge. IACR Cryptol. ePrint Arch. 2020: 1568 (2020)
2010 – 2019
- 2019
- [c76]Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for the Algorand Cryptocurrency. NDSS 2019 - [c75]Eleftherios Ioannidis, M. Frans Kaashoek, Nickolai Zeldovich:
Extracting and Optimizing Formally Verified Code for Systems Programming. NFM 2019: 228-236 - [c74]Tej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Argosy: verifying layered storage systems with recovery refinement. PLDI 2019: 1054-1068 - [c73]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: a device for secure transaction approval. SOSP 2019: 97-113 - [c72]David Lazar, Yossi Gilad, Nickolai Zeldovich:
Yodel: strong metadata security for voice calls. SOSP 2019: 211-224 - [c71]Tej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying concurrent, crash-safe systems with Perennial. SOSP 2019: 243-258 - 2018
- [c70]Frank Wang, James Mickens, Nickolai Zeldovich:
Veil: Private Browsing Semantics Without Browser-side Assistance. NDSS 2018 - [c69]Tej Chajed, M. Frans Kaashoek, Butler W. Lampson, Nickolai Zeldovich:
Verifying concurrent software using movers in CSPEC. OSDI 2018: 306-322 - [c68]Atalay Mert Ileri, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Proving confidentiality in a file system using DiskSec. OSDI 2018: 323-338 - [c67]David Lazar, Yossi Gilad, Nickolai Zeldovich:
Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. OSDI 2018: 711-725 - [i11]Lillian Tsai, Eddie Kohler, M. Frans Kaashoek, Nickolai Zeldovich:
A Revised and Verified Proof of the Scalable Commutativity Rule. CoRR abs/1809.09550 (2018) - [i10]Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for Cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 269 (2018) - 2017
- [j11]Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler:
Certifying a file system using crash hoare logic: correctness in the presence of crashes. Commun. ACM 60(4): 75-84 (2017) - [j10]Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert Tappan Morris, Nickolai Zeldovich:
The scalable commutativity rule: designing scalable software for multicore processors. Commun. ACM 60(8): 83-90 (2017) - [c66]Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. SOSP 2017: 51-68 - [c65]Srivatsa S. Bhat, Rasha Eqbal, Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
Scaling a file system to many cores using an operation log. SOSP 2017: 69-86 - [c64]Haogang Chen, Tej Chajed, Alex Konradi, Stephanie Wang, Atalay Mert Ileri, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying a high-performance crash-safe file system using a tree specification. SOSP 2017: 270-286 - [c63]Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. SOSP 2017: 423-440 - [i9]Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. IACR Cryptol. ePrint Arch. 2017: 454 (2017) - 2016
- [j9]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A differential approach to undefined behavior detection. Commun. ACM 59(3): 99-106 (2016) - [c62]Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan:
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. NSDI 2016: 611-626 - [c61]David Lazar, Nickolai Zeldovich:
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. OSDI 2016: 571-586 - [c60]Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare Logic for Certifying the FSCQ File System. USENIX ATC 2016 - [i8]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - [i7]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building web applications on top of encrypted data using Mylar. IACR Cryptol. ePrint Arch. 2016: 893 (2016) - [i6]Nirvan Tyagi, Yossi Gilad, Matei Zaharia, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. IACR Cryptol. ePrint Arch. 2016: 943 (2016) - 2015
- [j8]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich, Robert Tappan Morris, Eddie Kohler:
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors. ACM Trans. Comput. Syst. 32(4): 10:1-10:47 (2015) - [j7]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A Differential Approach to Undefined Behavior Detection. ACM Trans. Comput. Syst. 33(1): 1:1-1:29 (2015) - [j6]Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Tool for Parsing and Generating Data Formats. login Usenix Mag. 40(1) (2015) - [c59]Charles Gruenwald III, Filippo Sironi, M. Frans Kaashoek, Nickolai Zeldovich:
Hare: a file system for non-cache-coherent multicores. EuroSys 2015: 30:1-30:16 - [c58]Tej Chajed, Jon Gjengset, Jelle van den Hooff, M. Frans Kaashoek, James Mickens, Robert Tappan Morris, Nickolai Zeldovich:
Amber: Decoupling User Data from Web Applications. HotOS 2015 - [c57]Haogang Chen, Daniel Ziegler, Adam Chlipala, M. Frans Kaashoek, Eddie Kohler, Nickolai Zeldovich:
Specifying Crash Safety for Storage Systems. HotOS 2015 - [c56]Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare logic for certifying the FSCQ file system. SOSP 2015: 18-37 - [c55]Jelle van den Hooff, David Lazar, Matei Zaharia, Nickolai Zeldovich:
Vuvuzela: scalable private messaging resistant to traffic analysis. SOSP 2015: 137-152 - [i5]Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan:
Guidelines for Using the CryptDB System Securely. IACR Cryptol. ePrint Arch. 2015: 979 (2015) - 2014
- [j5]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. login Usenix Mag. 39(4) (2014) - [c54]David Lazar, Haogang Chen, Xi Wang, Nickolai Zeldovich:
Why does cryptographic software fail?: a case study and open problems. APSys 2014: 7:1-7:7 - [c53]Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich:
VerSum: Verifiable Computations over Large Public Logs. CCS 2014: 1304-1316 - [c52]Raluca Ada Popa, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. NSDI 2014: 157-172 - [c51]Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock:
Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. OSDI 2014: 33-47 - [c50]Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Identifying Information Disclosure in Web Applications with Retroactive Auditing. OSDI 2014: 555-569 - [c49]Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Tool for Parsing and Generating Data Formats. OSDI 2014: 615-628 - [c48]Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Interface Generator for Data Formats. IEEE Symposium on Security and Privacy Workshops 2014: 158-166 - [e1]Garth Gibson, Nickolai Zeldovich:
Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014, Philadelphia, PA, USA, June 19-20, 2014. USENIX Association 2014 [contents] - 2013
- [j4]Stephen Tu, M. Frans Kaashoek, Samuel Madden, Nickolai Zeldovich:
Processing Analytical Queries over Encrypted Data. Proc. VLDB Endow. 6(5): 289-300 (2013) - [c47]Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Security bugs in embedded interpreters. APSys 2013: 17:1-17:7 - [c46]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Optimizing unit test execution in large software programs using dependency analysis. APSys 2013: 19:1-19:6 - [c45]Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, Srinivas Devadas:
Authenticated storage using small trusted hardware. CCSW 2013: 35-46 - [c44]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
How to Run Turing Machines on Encrypted Data. CRYPTO (2) 2013: 536-553 - [c43]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
RadixVM: scalable address spaces for multithreaded applications. EuroSys 2013: 211-224 - [c42]Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein:
Systematic Analysis of Defenses against Return-Oriented Programming. RAID 2013: 82-102 - [c41]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich, Robert Tappan Morris, Eddie Kohler:
The scalable commutativity rule: designing scalable software for multicore processors. SOSP 2013: 1-17 - [c40]Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich:
Asynchronous intrusion recovery for interconnected web services. SOSP 2013: 213-227 - [c39]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
Towards optimization-safe systems: analyzing the impact of undefined behavior. SOSP 2013: 260-275 - [c38]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IEEE Symposium on Security and Privacy 2013: 463-477 - [c37]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Reusable garbled circuits and succinct functional encryption. STOC 2013: 555-564 - [c36]Taesoo Kim, Nickolai Zeldovich:
Practical and Effective Sandboxing for Non-root Users. USENIX ATC 2013: 139-144 - [i4]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IACR Cryptol. ePrint Arch. 2013: 129 (2013) - [i3]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Overcoming the Worst-Case Curse for Cryptographic Constructions. IACR Cryptol. ePrint Arch. 2013: 229 (2013) - [i2]Raluca A. Popa, Nickolai Zeldovich:
Multi-Key Searchable Encryption. IACR Cryptol. ePrint Arch. 2013: 508 (2013) - 2012
- [j3]Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: processing queries on an encrypted database. Commun. ACM 55(9): 103-111 (2012) - [c35]Xi Wang, Haogang Chen, Alvin Cheung, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Undefined behavior: what happened to my code? APSys 2012: 9 - [c34]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Recovering from intrusions in distributed systems with DARE. APSys 2012: 10 - [c33]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
Scalable address spaces using RCU balanced trees. ASPLOS 2012: 199-210 - [c32]Aleksey Pesterev, Jacob Strauss, Nickolai Zeldovich, Robert Tappan Morris:
Improving network connection locality on multicore systems. EuroSys 2012: 337-350 - [c31]Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Improving Integer Security for Systems with KINT. OSDI 2012: 163-177 - [c30]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Efficient Patch-based Auditing for Web Application Vulnerabilities. OSDI 2012: 193-206 - [c29]Zviad Metreveli, Nickolai Zeldovich, M. Frans Kaashoek:
CPHASH: a cache-partitioned hash table. PPoPP 2012: 319-320 - [i1]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond. IACR Cryptol. ePrint Arch. 2012: 733 (2012) - 2011
- [j2]Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making information flow explicit in HiStar. Commun. ACM 54(11): 93-101 (2011) - [c28]Haogang Chen, Yandong Mao, Xi Wang, Dong Zhou, Nickolai Zeldovich, M. Frans Kaashoek:
Linux kernel vulnerabilities: state-of-the-art defenses and open problems. APSys 2011: 5 - [c27]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Retroactive auditing. APSys 2011: 9 - [c26]Carlo Curino, Evan P. C. Jones, Raluca A. Popa, Nirmesh Malviya, Eugene Wu, Samuel Madden, Hari Balakrishnan, Nickolai Zeldovich:
Relational Cloud: a Database Service for the cloud. CIDR 2011: 235-240 - [c25]Arjun Roy, Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Energy management in mobile devices with the cinder operating system. EuroSys 2011: 139-152 - [c24]Priya Gupta, Nickolai Zeldovich, Samuel Madden:
A Trigger-Based Middleware Cache for ORMs. Middleware 2011: 329-349 - [c23]Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: protecting confidentiality with encrypted query processing. SOSP 2011: 85-100 - [c22]Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich:
Intrusion recovery for database-backed web applications. SOSP 2011: 101-114 - [c21]Yandong Mao, Haogang Chen, Dong Zhou, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Software fault isolation with API integrity and multi-principal modules. SOSP 2011: 115-128 - [c20]Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi:
Secure In-Band Wireless Pairing. USENIX Security Symposium 2011 - [c19]Joseph Werther, Michael Zhivich, Tim Leek, Nickolai Zeldovich:
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. CSET 2011 - 2010
- [j1]Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. Comput. Commun. Rev. 40(1): 106-111 (2010) - [c18]Aleksey Pesterev, Nickolai Zeldovich, Robert Tappan Morris:
Locating cache performance bottlenecks using data profiling. EuroSys 2010: 335-348 - [c17]Silas Boyd-Wickizer, Austin T. Clements, Yandong Mao, Aleksey Pesterev, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
An Analysis of Linux Scalability to Many Cores. OSDI 2010: 1-16 - [c16]Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Intrusion Recovery Using Selective Re-execution. OSDI 2010: 89-104 - [c15]Silas Boyd-Wickizer, Nickolai Zeldovich:
Tolerating Malicious Device Drivers in Linux. USENIX ATC 2010 - [c14]Taesoo Kim, Nickolai Zeldovich:
Making Linux Protection Mechanisms Egalitarian with UserFS. USENIX Security Symposium 2010: 13-28 - [c13]Ramesh Chandra, Priya Gupta, Nickolai Zeldovich:
Separating Web Applications from User Data Storage with BSTORE. WebApps 2010
2000 – 2009
- 2009
- [c12]Jad Naous, Ryan Stutsman, David Mazières, Nick McKeown, Nickolai Zeldovich:
Delegating network security with more information. WREN 2009: 19-26 - [c11]Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. MobiHeld 2009: 49-54 - [c10]Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Improving application security with data flow assertions. SOSP 2009: 291-304 - [c9]Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich:
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. USENIX Security Symposium 2009: 267-282 - 2008
- [b1]Nickolai Zeldovich:
Securing untrustworthy software using information flow control. Stanford University, USA, 2008 - [c8]Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières:
Securing Distributed Systems with Information Flow Control. NSDI 2008: 293-308 - [c7]Nickolai Zeldovich, Hari Kannan, Michael Dalton, Christos Kozyrakis:
Hardware Enforcement of Application Security Policies Using Tagged Memory. OSDI 2008: 225-240 - 2006
- [c6]Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making Information Flow Explicit in HiStar. OSDI 2006: 263-278 - 2005
- [c5]Ramesh Chandra, Nickolai Zeldovich, Constantine P. Sapuntzakis, Monica S. Lam:
The Collective: A Cache-Based System Management Architecture. NSDI 2005 - [c4]Nickolai Zeldovich, Ramesh Chandra:
Interactive Performance Measurement with VNCPlay. USENIX ATC, FREENIX Track 2005: 189-198 - 2003
- [c3]Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum:
Virtual Appliances for Deploying and Maintaining Software. LISA 2003: 181-194 - [c2]Nickolai Zeldovich, Alexander Yip, Frank Dabek, Robert Tappan Morris, David Mazières, M. Frans Kaashoek:
Multiprocessor Support for Event-Driven Programs. USENIX ATC, General Track 2003: 239-252 - 2002
- [c1]Frank Dabek, Nickolai Zeldovich, M. Frans Kaashoek, David Mazières, Robert Tappan Morris:
Event-driven programming for robust software. ACM SIGOPS European Workshop 2002: 186-189
Coauthor Index
aka: Raluca Ada Popa
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint