Nickolai Zeldovich
Orcid: 0000-0003-0238-2703Affiliations:
- Massachusetts Institute of Technology, Cambridge, USA
According to our database1,
Nickolai Zeldovich
authored at least 104 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Grove: a Separation-Logic Library for Verifying Distributed Systems (Extended Version).
CoRR, 2023
Proceedings of the 29th Symposium on Operating Systems Principles, 2023
Verifying vMVCC, a high-performance transaction library using multi-version concurrency control.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, 2023
2022
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies.
Proceedings of the 31st USENIX Security Symposium, 2022
Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
2021
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
2019
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the NASA Formal Methods - 11th International Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Certifying a file system using crash hoare logic: correctness in the presence of crashes.
Commun. ACM, 2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016
2015
login Usenix Mag., 2015
ACM Trans. Comput. Syst., 2015
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors.
ACM Trans. Comput. Syst., 2015
Proceedings of the 25th Symposium on Operating Systems Principles, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Proceedings of the Tenth European Conference on Computer Systems, 2015
2014
login Usenix Mag., 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Asia-Pacific Workshop on Systems, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Eighth Eurosys Conference 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Asia-Pacific Workshop on Systems, 2013
Proceedings of the Asia-Pacific Workshop on Systems, 2013
2012
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 17th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2012
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
Proceedings of the European Conference on Computer Systems, 2012
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012
Proceedings of the Asia-Pacific Workshop on Systems, 2012
Proceedings of the Asia-Pacific Workshop on Systems, 2012
2011
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011
Proceedings of the European Conference on Computer Systems, 2011
Proceedings of the Fifth Biennial Conference on Innovative Data Systems Research, 2011
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011
2010
Proceedings of the USENIX Conference on Web Application Development, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 2010 USENIX Annual Technical Conference, 2010
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
Proceedings of the European Conference on Computer Systems, 2010
2009
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications.
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009
2008
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
2005
Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, 2005
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005
2003
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003
2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002