Seguir
Amit Levy
Título
Citado por
Citado por
Año
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX security symposium 316, 10-5555, 2009
5772009
Hails: Protecting data privacy in untrusted web applications
DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
10th Symposium on Operating Systems Design and Implementation (OSDI), 47-60, 2012
1922012
Multiprogramming a 64kb computer safely and efficiently
A Levy, B Campbell, B Ghena, DB Giffin, P Pannuto, P Dutta, P Levis
Proceedings of the 26th Symposium on Operating Systems Principles, 234-251, 2017
1892017
Comet: An Active Distributed {Key-Value} Store
R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
1212010
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
832013
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Maziéres
Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012
832012
Ownership is theft: Experiences building an embedded OS in Rust
A Levy, MP Andersen, B Campbell, D Culler, P Dutta, B Ghena, P Levis, ...
Proceedings of the 8th Workshop on Programming Languages and Operating …, 2015
722015
The case for writing a kernel in rust
A Levy, B Campbell, B Ghena, P Pannuto, P Dutta, P Levis
Proceedings of the 8th Asia-Pacific Workshop on Systems, 1-7, 2017
712017
Beetle: Flexible communication for bluetooth low energy
AA Levy, J Hong, L Riliskis, P Levis, K Winstein
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
532016
Position paper: Progressive memory safety for webassembly
C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
472019
New directions for self-destructing data
R Geambasu, T Kohno, A Krishnamurthy, A Levy, HM Levy, P Gardner, ...
University of Washington, Tech. Rep. UW-CSE-11-08-01, 2011
27*2011
Stickler: Defending against malicious content distribution networks in an unmodified browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
25*2016
Don't talk unless i say so! securing the internet of things with default-off networking
J Hong, A Levy, L Riliskis, P Levis
2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018
242018
Blade: A data center garbage collector
D Terei, A Levy
arXiv preprint arXiv:1504.02578, 2015
172015
Hails: Protecting data privacy in untrusted web applications
D Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
Journal of Computer Security 25 (4-5), 427-461, 2017
162017
A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems
P Buiras, A Levy, D Stefan, A Russo, D Mazières
8th International Symposium on Trustworthy Global Computing (TGC 2013), 2013
16*2013
Doing more with less: Orchestrating serverless applications without an orchestrator
DH Liu, A Levy, S Noghabi, S Burckhardt
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
112023
Building comprehensible access control for the Internet of Things using beetle
J Hong, A Levy, P Levis
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
102016
Power clocks: Dynamic multi-clock management for embedded systems
H Chiang, H Ayers
6th Annual International Conference on Distributed Computing in Sensor …, 2021
82021
A networked embedded system platform for the post-mote era
P Pannuto, MP Andersen, T Bauer, B Campbell, A Levy, D Culler, P Levis, ...
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
82014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20