Andreas Haeberlen

Orcid: 0000-0002-3271-8354

According to our database1, Andreas Haeberlen authored at least 77 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Arboretum: A Planner for Large-Scale Federated Analytics with Differential Privacy.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

Metaverse as a Service: Megascale Social 3D on the Cloud.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

2021
Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

Do Not Overpay for Fault Tolerance!
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

DNA: Dynamic Resource Allocation for Soft Real-Time Multicore Systems.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

REBOUND: defending distributed systems against attacks with bounded-time recovery.
Proceedings of the EuroSys '21: Sixteenth European Conference on Computer Systems, 2021

2020
Testing differential privacy with dual interpreters.
Proc. ACM Program. Lang., 2020

Bounded-time recovery for distributed real-time systems.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2020

Orchard: Differentially Private Analytics at Scale.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
Fuzzi: a three-level logic for differential privacy.
Proc. ACM Program. Lang., 2019

Program for TPDP 2016.
J. Priv. Confidentiality, 2019

Honeycrisp: large-scale differentially private aggregation without a trusted core.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

The Synchronous Data Center.
Proceedings of the Workshop on Hot Topics in Operating Systems, 2019

2018
Data Center Diagnostics with Network Provenance.
IEEE Data Eng. Bull., 2018

Using Differential Privacy to Efficiently Mitigate Side Channels in Distributed Analytics.
Proceedings of the 11th European Workshop on Systems Security, 2018

DeDoS: Defusing DoS with Dispersion Oriented Software.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A framework for adaptive differential privacy.
Proc. ACM Program. Lang., 2017

A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Automated Bug Removal for Software-Defined Networks.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

DStress: Efficient Differentially Private Computations on Distributed Data.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead.
Proceedings of the 8th Biennial Conference on Innovative Data Systems Research, 2017

2016
Private and Verifiable Interdomain Routing Decisions.
IEEE/ACM Trans. Netw., 2016

The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Big Data Analytics over Encrypted Datasets with Seabed.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Dispersing Asymmetric DDoS Attacks with SplitStack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

Cloud-Based Secure Logger for Medical Devices.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Fault Tolerance and the Five-Second Rule.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Automated Network Repair with Meta Provenance.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

Differential Provenance: Better Network Diagnostics with Reference Events.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

Verifiable differential privacy.
Proceedings of the Tenth European Conference on Computer Systems, 2015

2014
A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

Diagnosing missing events in distributed systems with negative provenance.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Detecting Covert Timing Channels with Time-Deterministic Replay.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Compute Globally, Act Locally: Protecting Federated Systems from Systemic Threats.
Proceedings of the 10th Workshop on Hot Topics in System Dependability, 2014

Differential Privacy: An Economic Method for Choosing Epsilon.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
TrustForge: Flexible access control for collaborative crowd-sourced environment.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Linear dependent types for differential privacy.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Peer-assisted content distribution in Akamai netsession.
Proceedings of the 2013 Internet Measurement Conference, 2013

Sensitivity analysis using type-based constraints.
Proceedings of the 1st annual workshop on Functional programming concepts in domain-specific languages, 2013

Answering why-not queries in software-defined networks with negative provenance.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Towards privacy-preserving fault detection.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013


2012
Distributed Time-aware Provenance.
Proc. VLDB Endow., 2012

Querying Provenance for Ranking and Recommending.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

DJoin: Differentially Private Join Queries over Distributed Databases.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Reliable Client Accounting for P2P-Infrastructure Hybrids.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

2011
Differential Privacy Under Fire.
Proceedings of the 20th USENIX Security Symposium, 2011

Challenges in Experimenting with Botnet Detection Systems.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

TAP: Time-aware Provenance for Distributed Systems.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Secure network provenance.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

NetTrails: a declarative platform for maintaining and querying provenance in distributed systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Having your cake and eating it too: routing security with privacy protections.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Seventh workshop on hot topics in system dependability (HotDep'11).
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
A case for the accountable cloud.
ACM SIGOPS Oper. Syst. Rev., 2010

Accountable Virtual Machines.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Differential privacy for collaborative security.
Proceedings of the Third European Workshop on System Security, 2010

2009
The Fault Detection Problem.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009

NetReview: Detecting When Interdomain Routing Goes Wrong.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Satellitelab: adding heterogeneity to planetary-scale network testbeds.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Detecting bittorrent blocking.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Pretty Good Packet Authentication.
Proceedings of the Fourth Workshop on Hot Topics in System Dependability, 2008

2007
PeerReview: practical accountability for distributed systems.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Characterizing residential broadband networks.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

2006
Efficient Replica Maintenance for Distributed Storage Systems.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

Proactive Replication for Data Durability.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

Fallacies in Evaluating Decentralized Systems.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

Monarch: a tool to emulate transport protocol flowsover the internet at large.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

The Case for Byzantine Fault Detection.
Proceedings of the Second Workshop on Hot Topics in System Dependability, 2006

Experiences in building and operating ePOST, a reliable peer-to-peer application.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

Abstracting out Byzantine Behavior.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

2005
ePOST.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

2004
Practical robust localization over large-scale 802.11 wireless networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

2003
User-Level Management of Kernel Memory.
Proceedings of the Advances in Computer Systems Architecture, 2003

2000
Stub-Code Performance Is Becoming Important.
Proceedings of the First Workshop on Industrial Experiences with Systems Software, 2000


  Loading...