关注
Amit Levy
标题
引用次数
引用次数
年份
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX security symposium 316, 10-5555, 2009
5792009
Multiprogramming a 64kb computer safely and efficiently
A Levy, B Campbell, B Ghena, DB Giffin, P Pannuto, P Dutta, P Levis
Proceedings of the 26th Symposium on Operating Systems Principles, 234-251, 2017
1952017
Hails: Protecting data privacy in untrusted web applications
DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
10th Symposium on Operating Systems Design and Implementation (OSDI), 47-60, 2012
1922012
Comet: An Active Distributed {Key-Value} Store
R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
1212010
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Maziéres
Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012
842012
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
832013
Ownership is theft: Experiences building an embedded OS in Rust
A Levy, MP Andersen, B Campbell, D Culler, P Dutta, B Ghena, P Levis, ...
Proceedings of the 8th Workshop on Programming Languages and Operating …, 2015
722015
The case for writing a kernel in rust
A Levy, B Campbell, B Ghena, P Pannuto, P Dutta, P Levis
Proceedings of the 8th Asia-Pacific Workshop on Systems, 1-7, 2017
712017
Beetle: Flexible communication for bluetooth low energy
AA Levy, J Hong, L Riliskis, P Levis, K Winstein
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
532016
Position paper: Progressive memory safety for webassembly
C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
482019
New directions for self-destructing data
R Geambasu, T Kohno, A Krishnamurthy, A Levy, HM Levy, P Gardner, ...
University of Washington, Tech. Rep. UW-CSE-11-08-01, 2011
27*2011
Stickler: Defending against malicious content distribution networks in an unmodified browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
26*2016
Don't talk unless i say so! securing the internet of things with default-off networking
J Hong, A Levy, L Riliskis, P Levis
2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018
242018
Blade: A data center garbage collector
D Terei, A Levy
arXiv preprint arXiv:1504.02578, 2015
172015
Hails: Protecting data privacy in untrusted web applications
D Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
Journal of Computer Security 25 (4-5), 427-461, 2017
162017
A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems
P Buiras, A Levy, D Stefan, A Russo, D Mazières
8th International Symposium on Trustworthy Global Computing (TGC 2013), 2013
16*2013
Doing more with less: Orchestrating serverless applications without an orchestrator
DH Liu, A Levy, S Noghabi, S Burckhardt
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
132023
Building comprehensible access control for the Internet of Things using beetle
J Hong, A Levy, P Levis
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
102016
Power clocks: Dynamic multi-clock management for embedded systems
H Chiang, H Ayers
6th Annual International Conference on Distributed Computing in Sensor …, 2021
82021
A networked embedded system platform for the post-mote era
P Pannuto, MP Andersen, T Bauer, B Campbell, A Levy, D Culler, P Levis, ...
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
82014
系统目前无法执行此操作,请稍后再试。
文章 1–20