Thomas Pasquier

Orcid: 0000-0001-6876-1306

Affiliations:
  • Harvard University, Cambridge, MA, USA


According to our database1, Thomas Pasquier authored at least 52 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions.
CoRR, 2024

Securing Monolithic Kernels using Compartmentalization.
CoRR, 2024

FetchBPF: Customizable Prefetching Policies in Linux with eBPF.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Computational Experiment Comprehension using Provenance Summarization.
Proceedings of the 2nd ACM Conference on Reproducibility and Replicability, 2024

2023
Making Provenance Work for You.
R J., February, 2023

Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing.
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023

2022
Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection.
CoRR, 2022

PACED: Provenance-based Automated Container Escape Detection.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

IoT Key Exchange Performance Analysis.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

2021
A large-scale study on research code quality and execution.
CoRR, 2021

SIGL: Securing Software Installations Through Deep Graph Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Container Escape Detection for Edge Devices.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Secure Namespaced Kernel Audit for Containers.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

2020
Rclean: A Tool for Writing Cleaner, More Transparent Code.
J. Open Source Softw., 2020

Tuneful: An Online Significance-Aware Configuration Tuner for Big Data Analytics.
CoRR, 2020

Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

To Tune or Not to Tune?: In Search of Optimal Configurations for Data Analytics.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020

Xanthus: Push-button Orchestration of Host Provenance Data Collection.
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020

Demonstrating the Practicality of Unikernels to Build a Serverless Platform at the Edge.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

Accelerating the Configuration Tuning of Big Data Analytics with Similarity-aware Multitask Bayesian Optimization.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance.
CoRR, 2019

Personal data and the internet of things.
Commun. ACM, 2019

From Here to Provtopia.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

ProvMark: A Provenance Expressiveness Benchmarking System.
Proceedings of the 20th International Middleware Conference, 2019

Towards Seamless Configuration Tuning of Big Data Analytics.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Data provenance to audit compliance with privacy policy in the Internet of Things.
Pers. Ubiquitous Comput., 2018

Sharing and Preserving Computational Analyses for Posterity with encapsulator.
Comput. Sci. Eng., 2018

Provenance-based Intrusion Detection: Opportunities and Challenges.
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018

Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Camflow: Managed Data-Sharing for Cloud Services.
IEEE Trans. Cloud Comput., 2017

PHP2Uni: Building Unikernels Using Scripting Language Transpilation.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

FRAPpuccino: Fault-detection through Runtime Analysis of Provenance.
Proceedings of the 9th USENIX Workshop on Hot Topics in Cloud Computing, 2017

Practical whole-system provenance capture.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud.
Tiny Trans. Comput. Sci., 2016

Twenty Security Considerations for Cloud-Supported Internet of Things.
IEEE Internet Things J., 2016

Data-Centric Access Control for Cloud Computing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

Information Flow Control with Minimal Tag Disclosure.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

Information Flow Audit for PaaS Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Information Flow Audit for Transparency and Compliance in the Handling of Personal Data.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

2015
Data Flow Management and Compliance in Cloud Computing.
IEEE Cloud Comput., 2015

Securing tags to control information flows within the Internet of Things.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Integrating Messaging Middleware and Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Information Flow Control for Strong Protection with Flexible Sharing in PaaS.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Clouds of Things Need Information Flow Control with Hardware Roots of Trust.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Managing Big Data with Information Flow Control.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Information Flow Control for Secure Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2014

FlowK: Information Flow Control for the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

FlowR: aspect oriented programming for information flow control in ruby.
Proceedings of the 13th International Conference on Modularity, 2014


  Loading...