Nickolai Zeldovich

Orcid: 0000-0003-0238-2703

Affiliations:
  • Massachusetts Institute of Technology, Cambridge, USA


According to our database1, Nickolai Zeldovich authored at least 104 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024

Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Private Web Search with Tiptoe.
IACR Cryptol. ePrint Arch., 2023

Grove: a Separation-Logic Library for Verifying Distributed Systems (Extended Version).
CoRR, 2023

Grove: a Separation-Logic Library for Verifying Distributed Systems.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

Verifying vMVCC, a high-performance transaction library using multi-version concurrency control.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

The K2 Architecture for Trustworthy Hardware Security Modules.
Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, 2023

2022
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies.
Proceedings of the 31st USENIX Security Symposium, 2022

Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

Groove: Flexible Metadata-Private Messaging.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

Verifying Hardware Security Modules with Information-Preserving Refinement.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

2021
GoJournal: a verified, concurrent, crash-safe journaling system.
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021

2020
Notary: A Device for Secure Transaction Approval.
login Usenix Mag., 2020

Compact Certificates of Collective Knowledge.
IACR Cryptol. ePrint Arch., 2020

Aardvark: A Concurrent Authenticated Dictionary with Short Proofs.
IACR Cryptol. ePrint Arch., 2020

Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
Yodel: strong metadata security for voice calls.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

Verifying concurrent, crash-safe systems with Perennial.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

Argosy: verifying layered storage systems with recovery refinement.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

Extracting and Optimizing Formally Verified Code for Systems Programming.
Proceedings of the NASA Formal Methods - 11th International Symposium, 2019

Vault: Fast Bootstrapping for the Algorand Cryptocurrency.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Vault: Fast Bootstrapping for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

A Revised and Verified Proof of the Scalable Commutativity Rule.
CoRR, 2018

Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

Proving confidentiality in a file system using DiskSec.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

Verifying concurrent software using movers in CSPEC.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

Veil: Private Browsing Semantics Without Browser-side Assistance.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Algorand: Scaling Byzantine Agreements for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2017

Certifying a file system using crash hoare logic: correctness in the presence of crashes.
Commun. ACM, 2017

Stadium: A Distributed Metadata-Private Messaging System.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Verifying a high-performance crash-safe file system using a tree specification.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Scaling a file system to many cores using an operation log.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

2016
Stadium: A Distributed Metadata-Private Messaging System.
IACR Cryptol. ePrint Arch., 2016

Report on the NSF Workshop on Formal Methods for Security.
CoRR, 2016

Using Crash Hoare Logic for Certifying the FSCQ File System.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
Nail: A Practical Tool for Parsing and Generating Data Formats.
login Usenix Mag., 2015

A Differential Approach to Undefined Behavior Detection.
ACM Trans. Comput. Syst., 2015

The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors.
ACM Trans. Comput. Syst., 2015

Guidelines for Using the CryptDB System Securely.
IACR Cryptol. ePrint Arch., 2015

Vuvuzela: scalable private messaging resistant to traffic analysis.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

Specifying Crash Safety for Storage Systems.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Amber: Decoupling User Data from Web Applications.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Hare: a file system for non-cache-coherent multicores.
Proceedings of the Tenth European Conference on Computer Systems, 2015

2014
Building Web Applications on Top of Encrypted Data Using Mylar.
login Usenix Mag., 2014

Nail: A Practical Interface Generator for Data Formats.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Jitk: A Trustworthy In-Kernel Interpreter Infrastructure.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Identifying Information Disclosure in Web Applications with Retroactive Auditing.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Building Web Applications on Top of Encrypted Data Using Mylar.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

VerSum: Verifiable Computations over Large Public Logs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Why does cryptographic software fail?: a case study and open problems.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2013
Processing Analytical Queries over Encrypted Data.
Proc. VLDB Endow., 2013

Multi-Key Searchable Encryption.
IACR Cryptol. ePrint Arch., 2013

An Ideal-Security Protocol for Order-Preserving Encoding.
IACR Cryptol. ePrint Arch., 2013

Overcoming the Worst-Case Curse for Cryptographic Constructions.
IACR Cryptol. ePrint Arch., 2013

Practical and Effective Sandboxing for Non-root Users.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

Reusable garbled circuits and succinct functional encryption.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Towards optimization-safe systems: analyzing the impact of undefined behavior.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

Asynchronous intrusion recovery for interconnected web services.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

Systematic Analysis of Defenses against Return-Oriented Programming.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

RadixVM: scalable address spaces for multithreaded applications.
Proceedings of the Eighth Eurosys Conference 2013, 2013

How to Run Turing Machines on Encrypted Data.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Authenticated storage using small trusted hardware.
Proceedings of the CCSW'13, 2013

Optimizing unit test execution in large software programs using dependency analysis.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

Security bugs in embedded interpreters.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

2012
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.
IACR Cryptol. ePrint Arch., 2012

CryptDB: processing queries on an encrypted database.
Commun. ACM, 2012

CPHASH: a cache-partitioned hash table.
Proceedings of the 17th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2012

Improving Integer Security for Systems with KINT.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Efficient Patch-based Auditing for Web Application Vulnerabilities.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Improving network connection locality on multicore systems.
Proceedings of the European Conference on Computer Systems, 2012

Scalable address spaces using RCU balanced trees.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

Undefined behavior: what happened to my code?
Proceedings of the Asia-Pacific Workshop on Systems, 2012

Recovering from intrusions in distributed systems with DARE.
Proceedings of the Asia-Pacific Workshop on Systems, 2012

2011
Making information flow explicit in HiStar.
Commun. ACM, 2011

Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Secure In-Band Wireless Pairing.
Proceedings of the 20th USENIX Security Symposium, 2011

CryptDB: protecting confidentiality with encrypted query processing.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Software fault isolation with API integrity and multi-principal modules.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Intrusion recovery for database-backed web applications.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

A Trigger-Based Middleware Cache for ORMs.
Proceedings of the Middleware 2011, 2011

Energy management in mobile devices with the cinder operating system.
Proceedings of the European Conference on Computer Systems, 2011

Relational Cloud: a Database Service for the cloud.
Proceedings of the Fifth Biennial Conference on Innovative Data Systems Research, 2011

Retroactive auditing.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

Linux kernel vulnerabilities: state-of-the-art defenses and open problems.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

2010
Apprehending joule thieves with cinder.
Comput. Commun. Rev., 2010

Separating Web Applications from User Data Storage with BSTORE.
Proceedings of the USENIX Conference on Web Application Development, 2010

Making Linux Protection Mechanisms Egalitarian with UserFS.
Proceedings of the 19th USENIX Security Symposium, 2010

Tolerating Malicious Device Drivers in Linux.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Intrusion Recovery Using Selective Re-execution.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

An Analysis of Linux Scalability to Many Cores.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Locating cache performance bottlenecks using data profiling.
Proceedings of the European Conference on Computer Systems, 2010

2009
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications.
Proceedings of the 18th USENIX Security Symposium, 2009

Improving application security with data flow assertions.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

Delegating network security with more information.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

2008
Securing untrustworthy software using information flow control.
PhD thesis, 2008

Hardware Enforcement of Application Security Policies Using Tagged Memory.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Securing Distributed Systems with Information Flow Control.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

2005
Interactive Performance Measurement with VNCPlay.
Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, 2005

The Collective: A Cache-Based System Management Architecture.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

2003
Multiprocessor Support for Event-Driven Programs.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

Virtual Appliances for Deploying and Maintaining Software.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003

2002
Event-driven programming for robust software.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002


  Loading...