David Mazières

Orcid: 0000-0002-1253-6449

Affiliations:
  • Stanford University, Department of Computer Science, CA, USA
  • New York University, Computer Science Department, NY, USA
  • Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, MA, USA


According to our database1, David Mazières authored at least 97 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Groundhog: Linearly-Scalable Smart Contracting via Commutative Transaction Semantics.
CoRR, 2024

Sidekick: In-Network Assistance for Secure End-to-End Transport Protocols.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

2023
Riggs: Decentralized Sealed-Bid Auctions.
IACR Cryptol. ePrint Arch., 2023

Finding the Right Curve: Optimal Design of Constant Function Market Makers.
Proceedings of the 24th ACM Conference on Economics and Computation, 2023

Accountable authentication with privacy protection: The Larch system for universal login.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

SPEEDEX: A Scalable, Parallelizable, and Economically Efficient Decentralized EXchange.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

2022
Batch Exchanges with Constant Function Market Makers: Axioms, Equilibria, and Computation.
CoRR, 2022

Extricating IoT Devices from Vendor Infrastructure with Karl.
CoRR, 2022

2021
SPEEDEX: A Scalable, Parallelizable, and Economically Efficient Digital EXchange.
CoRR, 2021

Syrup: User-Defined Scheduling Across the Stack.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

A case against (most) context switches.
Proceedings of the HotOS '21: Workshop on Hot Topics in Operating Systems, 2021

2020
Liquidity in Credit Networks with Constrained Agents.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

SafetyPin: Encrypted Backups with Human-Memorable Secrets.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
Cryptographic Protection of TCP Streams (tcpcrypt).
RFC, May, 2019

TCP-ENO: Encryption Negotiation Option.
RFC, May, 2019

Constrained Credit Networks.
CoRR, 2019

Stellar Consensus by Instantiation.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019

True2F: Backdoor-Resistant Authentication Tokens.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Fast and secure global payments with Stellar.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

Mind the Gap: A Case for Informed Request Scheduling at the NIC.
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019

2017
Flexible dynamic information flow control in the presence of exceptions.
J. Funct. Program., 2017

Hails: Protecting data privacy in untrusted web applications.
J. Comput. Secur., 2017

The Case For Secure Delegation.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

Towards Practical Default-On Multi-Core Record/Replay.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2015
Riposte: An Anonymous Messaging System Handling Millions of Users.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Is achieving security a hopeless quest?
Proceedings of the SOSP History Day 2015, Monterey, California, USA, October 4, 2015, 2015

CCFI: Cryptographically Enforced Control Flow Integrity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Cryptographically Enforced Control Flow Integrity.
CoRR, 2014

A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

Hacking Blind.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Millions of little minions: using packets for low latency network programming and visibility.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Dynamic space limits for Haskell.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Protecting Users by Confining JavaScript with COWL.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Building secure systems with LIO (demo).
Proceedings of the 2014 ACM SIGPLAN symposium on Haskell, 2014

Demo proposal: making web applications -XSafe.
Proceedings of the 2014 ACM SIGPLAN symposium on Haskell, 2014

Building Secure Systems with LIO (Demo).
Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, 2014

2013
A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems.
Proceedings of the Trustworthy Global Computing - 8th International Symposium, 2013

Replication, history, and grafting in the Ori file system.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

EyeQ: Practical Network Performance Isolation at the Edge.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Toward Principled Browser Security.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Tiny packet programs for low-latency network control and monitoring.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013


Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Safe Haskell.
Adv. Math. Commun., 2012

Where is the debugger for my software-defined network?
Proceedings of the first workshop on Hot topics in software defined networks, 2012

Dune: Safe User-level Access to Privileged CPU Features.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Addressing covert termination and timing channels in concurrent information flow systems.
Proceedings of the ACM SIGPLAN International Conference on Functional Programming, 2012

EyeQ: Practical Network Performance Isolation for the Multi-tenant Cloud.
Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing, 2012

2011
Making information flow explicit in HiStar.
Commun. ACM, 2011

The case for RAMCloud.
Commun. ACM, 2011

Disjunction Category Labels.
Proceedings of the Information Security Technology for Applications, 2011

Flexible dynamic information flow control in Haskell.
Proceedings of the 4th ACM SIGPLAN Symposium on Haskell, 2011

Energy management in mobile devices with the cinder operating system.
Proceedings of the European Conference on Computer Systems, 2011

Verifying and enforcing network paths with icing.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
Apprehending joule thieves with cinder.
Comput. Commun. Rev., 2010

The Case for Ubiquitous Transport-Level Encryption.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
The case for RAMClouds: scalable high-performance storage entirely in DRAM.
ACM SIGOPS Oper. Syst. Rev., 2009

Delegating network security with more information.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

A Policy Framework for the Future Internet.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
Securing Distributed Systems with Information Flow Control.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

2007
Labels and event processes in the Asbestos operating system.
ACM Trans. Comput. Syst., 2007

Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

2006
RE: Reliable Email.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

OASIS: Anycast for Any Service.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

Group Therapy for Systems: Using Link Attestations to Manage Failures.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

2005
Shark: Scaling File Servers via Cooperative Caching.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Make Least Privilege a Right (Not a Privilege).
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

2004
REX: Secure, Extensible Remote Execution.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Secure Untrusted Data Repository (SUNDR).
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Democratizing Content Publication with Coral.
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Multiprocessor Support for Event-Driven Programs.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

Decentralized user authentication in a global file system.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

Proactive Two-Party Signatures for User Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2003

Rateless Codes and Big Downloads.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

Sloppy Hashing and Self-Organizing Clusters.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

2002
Using SFS for a Secure Network File System.
login Usenix Mag., 2002

Fast and secure distributed read-only file system.
ACM Trans. Comput. Syst., 2002

Event-driven programming for robust software.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Building secure file systems out of Byzantine storage.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002

Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

2001
A Toolkit for User-Level File Systems.
Proceedings of the General Track: 2001 USENIX Annual Technical Conference, 2001

A Low-Bandwidth Network File System.
Proceedings of the 18th ACM Symposium on Operating System Principles, 2001

Censorship Resistant Publishing Through Document Entanglements.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

Don't Trust your File Server.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

Tangler: a censorship-resistant publishing system based on document entanglements.
Proceedings of the CCS 2001, 2001

2000
Self-certifying file system.
PhD thesis, 2000

1999
A Future-Adaptable Password Scheme.
Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference, 1999

Separating key management from file system security.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

1998
Escaping the evils of centralized control with self-certifying pathnames.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

The Design, Implementation and Operation of an Email Pseudonym Server.
Proceedings of the CCS '98, 1998

1997
Application Performance and Flexibility on Exokernel Systems.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

Secure Applications Need Flexible Operating Systems.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

1996
The Measured Performance of Personal Computer Operating Systems.
ACM Trans. Comput. Syst., 1996


  Loading...