Tal Garfinkel

According to our database1, Tal Garfinkel authored at least 31 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2020
The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing.
login Usenix Mag., 2020

Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version).
CoRR, 2020

Retrofitting Fine Grain Isolation in the Firefox Renderer.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Gobi: WebAssembly as a Practical Path to Library Sandboxing.
CoRR, 2019

Position Paper: Progressive Memory Safety for WebAssembly.
Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, 2019

2017
Towards Practical Default-On Multi-Core Record/Replay.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2014
XvMotion: Unified Virtual Machine Migration over Long Distance.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

2011
The Design and Evolution of Live Storage Migration in VMware ESX.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

2010
Paradigms for virtualization based host security.
PhD thesis, 2010

Multi-stage replay with crosscut.
Proceedings of the 6th International Conference on Virtual Execution Environments, 2010

2009
Virtual machine contracts for datacenter and cloud computing environments.
Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds, 2009

2008
Towards Application Security on Untrusted Operating Systems.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
What Virtualization Can Do for Security.
login Usenix Mag., 2007

Reducing shoulder-surfing by using gaze-based password entry.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Compatibility Is Not Transparency: VMM Detection Myths and Realities.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
SANE: A Protection Architecture for Enterprise Networks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

2005
Virtual Machine Monitors: Current Technology and Future Trends.
Computer, 2005

Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments.
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

2004
Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!).
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Data lifetime is a systems problem.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

Ostia: A Delegating Architecture for Secure System Call Interposition.
Proceedings of the Network and Distributed System Security Symposium, 2004

2003
Terra: a virtual machine-based platform for trusted computing.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

A Virtual Machine Introspection Based Architecture for Intrusion Detection.
Proceedings of the Network and Distributed System Security Symposium, 2003

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools.
Proceedings of the Network and Distributed System Security Symposium, 2003

Flexible OS Support and Applications for Trusted Computing.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

1999
Fiat lux.
Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques, 1999


  Loading...