Vanish: Increasing Data Privacy with Self-Destructing Data. R Geambasu, T Kohno, AA Levy, HM Levy USENIX security symposium 316, 10-5555, 2009 | 579 | 2009 |
Multiprogramming a 64kb computer safely and efficiently A Levy, B Campbell, B Ghena, DB Giffin, P Pannuto, P Dutta, P Levis Proceedings of the 26th Symposium on Operating Systems Principles, 234-251, 2017 | 195 | 2017 |
Hails: Protecting data privacy in untrusted web applications DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo 10th Symposium on Operating Systems Design and Implementation (OSDI), 47-60, 2012 | 192 | 2012 |
Comet: An Active Distributed {Key-Value} Store R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 121 | 2010 |
Addressing covert termination and timing channels in concurrent information flow systems D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Maziéres Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012 | 84 | 2012 |
Eliminating cache-based timing attacks with instruction-based scheduling D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 83 | 2013 |
Ownership is theft: Experiences building an embedded OS in Rust A Levy, MP Andersen, B Campbell, D Culler, P Dutta, B Ghena, P Levis, ... Proceedings of the 8th Workshop on Programming Languages and Operating …, 2015 | 72 | 2015 |
The case for writing a kernel in rust A Levy, B Campbell, B Ghena, P Pannuto, P Dutta, P Levis Proceedings of the 8th Asia-Pacific Workshop on Systems, 1-7, 2017 | 71 | 2017 |
Beetle: Flexible communication for bluetooth low energy AA Levy, J Hong, L Riliskis, P Levis, K Winstein Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 53 | 2016 |
Position paper: Progressive memory safety for webassembly C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019 | 48 | 2019 |
New directions for self-destructing data R Geambasu, T Kohno, A Krishnamurthy, A Levy, HM Levy, P Gardner, ... University of Washington, Tech. Rep. UW-CSE-11-08-01, 2011 | 27* | 2011 |
Stickler: Defending against malicious content distribution networks in an unmodified browser A Levy, H Corrigan-Gibbs, D Boneh IEEE Security & Privacy 14 (2), 22-28, 2016 | 26* | 2016 |
Don't talk unless i say so! securing the internet of things with default-off networking J Hong, A Levy, L Riliskis, P Levis 2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018 | 24 | 2018 |
Blade: A data center garbage collector D Terei, A Levy arXiv preprint arXiv:1504.02578, 2015 | 17 | 2015 |
Hails: Protecting data privacy in untrusted web applications D Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo Journal of Computer Security 25 (4-5), 427-461, 2017 | 16 | 2017 |
A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems P Buiras, A Levy, D Stefan, A Russo, D Mazières 8th International Symposium on Trustworthy Global Computing (TGC 2013), 2013 | 16* | 2013 |
Doing more with less: Orchestrating serverless applications without an orchestrator DH Liu, A Levy, S Noghabi, S Burckhardt 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023 | 13 | 2023 |
Building comprehensible access control for the Internet of Things using beetle J Hong, A Levy, P Levis Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 10 | 2016 |
Power clocks: Dynamic multi-clock management for embedded systems H Chiang, H Ayers 6th Annual International Conference on Distributed Computing in Sensor …, 2021 | 8 | 2021 |
A networked embedded system platform for the post-mote era P Pannuto, MP Andersen, T Bauer, B Campbell, A Levy, D Culler, P Levis, ... Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014 | 8 | 2014 |