2024
GlucOS: Security, correctness, and simplicity for automated insulin delivery.
CoRR, 2024
FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies.
CoRR, 2024
Security, extensibility, and redundancy in the Metabolic Operating System.
CoRR, 2024
2023
Aragorn: A Privacy-Enhancing System for Mobile Cameras.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Centauri: Practical Rowhammer Fingerprinting.
CoRR, 2023
2021
Credit Card Fraud Is a Computer Security Problem.
IEEE Secur. Priv., 2021
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Boxer: Preventing fraud by scanning credit cards.
Proceedings of the 29th USENIX Security Symposium, 2020
PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
2019
FinalFilter: Asserting Security Properties of a Processor at Runtime.
IEEE Micro, 2019
2018
A case for exposing extra-architectural state in the ISA: position paper.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018
2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2013
QuickRec: prototyping an intel architecture extension for record and replay of multithreaded programs.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013
Verifying security invariants in ExpressOS.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
Cyrus: unintrusive application-level record-replay for replay parallelism.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
2012
Using replicated execution for a more secure and reliable web browser.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
A Case for Parallelizing Web Pages.
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012
IBOS: A Correct-By-Construction Modular Browser.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012
2011
Designing and Implementing the OP and OP2 Web Browsers.
ACM Trans. Web, 2011
Vetting browser extensions for security vulnerabilities with VEX.
Commun. ACM, 2011
Building Secure Robot Applications.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Defeating UCI: Building Stealthy and Malicious Hardware.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Debugging the data plane with anteater.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Macho: Programming with Man Pages.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011
Fortifying web-based applications automatically.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
login Usenix Mag., 2010
Alhambra: a system for creating, enforcing, and testing browser security policies.
Proceedings of the 19th International Conference on World Wide Web, 2010
VEX: Vetting Browser Extensions for Security Vulnerabilities.
Proceedings of the 19th USENIX Security Symposium, 2010
Trust and Protection in the Illinois Browser Operating System.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
2009
The Multi-Principal OS Construction of the Gazelle Web Browser.
Proceedings of the 18th USENIX Security Symposium, 2009
Capo: a software-hardware interface for practical deterministic multiprocessor replay.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
Recovery domains: an organizing principle for recoverable operating systems.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Building a More Secure Web Browser.
login Usenix Mag., 2008
Virtualization and Security: Back to the Future.
IEEE Secur. Priv., 2008
Secure Web Browsing with the OP Web Browser.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Digging for Data Structures.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008
Designing and Implementing Malicious Hardware.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
2006
Analyzing intrusions using operating system level information flow.
PhD thesis, 2006
SubVirt: Implementing malware with virtual machines.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
ACM Trans. Comput. Syst., 2005
Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!).
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Detecting past and present intrusions through vulnerability-specific predicates.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005
Enriching Intrusion Alerts Through Multi-Host Causality.
Proceedings of the Network and Distributed System Security Symposium, 2005
2003
Operating System Support for Virtual Machines.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003
2002
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002