Deian Stefan
Deian Stefan
Verifierad e-postadress på eng.ucsd.edu - Startsida
Titel
Citeras av
Citeras av
År
File System Logging versus Clustering: A Performance Comparison.
MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ...
USENIX, 249-264, 1995
2041995
Systems and method for malware detection
YAO Danfeng, D Stefan, C Wu
US Patent 8,763,127, 2014
1862014
Flexible dynamic information flow control in Haskell
D Stefan, A Russo, JC Mitchell, D Mazières
Proceedings of the 4th ACM Symposium on Haskell, 95-106, 2011
1662011
Hails: Protecting data privacy in untrusted web applications
DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, JC Mitchell, A Russo
10th {USENIX} Symposium on Operating Systems Design and Implementation …, 2012
1622012
Fast software AES encryption
DA Osvik, JW Bos, D Stefan, D Canright
International Workshop on Fast Software Encryption, 75-93, 2010
1362010
Protecting Users by Confining JavaScript with {COWL}
D Stefan, EZ Yang, P Marchenko, A Russo, D Herman, B Karp, ...
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
902014
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Mazieres
ACM SIGPLAN Notices 47 (9), 201-214, 2012
752012
Fast Implementations of AES on Various Platforms.
JW Bos, DA Osvik, D Stefan
IACR Cryptol. ePrint Arch. 2009, 501, 2009
712009
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
European Symposium on Research in Computer Security, 718-735, 2013
702013
Disjunction category labels
D Stefan, A Russo, D Mazières, JC Mitchell
Nordic conference on secure IT systems, 223-239, 2011
652011
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
computers & security 31 (1), 109-121, 2012
602012
Low discrepancy sequences for Monte Carlo simulations on reconfigurable platforms
IL Dalal, D Stefan, J Harwayne-Gidansky
2008 International Conference on Application-Specific Systems, Architectures …, 2008
552008
Flexible dynamic information flow control in the presence of exceptions
D Stefan, A Russo, JC Mitchell, D Mazières
arXiv preprint arXiv:1207.1457, 2012
532012
Data-provenance verification for secure hosts
K Xu, H Xiong, C Wu, D Stefan, D Yao
IEEE Transactions on Dependable and Secure Computing 9 (2), 173-183, 2011
482011
Information-flow control for programming on encrypted data
JC Mitchell, R Sharma, D Stefan, J Zimmerman
2012 IEEE 25th Computer Security Foundations Symposium, 45-60, 2012
452012
Keystroke-dynamics authentication against synthetic forgeries
D Stefan, D Yao
6th International Conference on Collaborative Computing: Networking …, 2010
422010
User-assisted host-based detection of outbound malware traffic
H Xiong, P Malhotra, D Stefan, C Wu, D Yao
International Conference on Information and Communications Security, 293-307, 2009
392009
A hardware framework for the fast generation of multiple long-period random number streams
IL Dalal, D Stefan
Proceedings of the 16th international ACM/SIGDA symposium on Field …, 2008
342008
Ct-wasm: type-driven secure cryptography for the web ecosystem
C Watt, J Renner, N Popescu, S Cauligi, D Stefan
Proceedings of the ACM on Programming Languages 3 (POPL), 1-29, 2019
302019
Fact: A flexible, constant-time programming language
S Cauligi, G Soeller, F Brown, B Johannesmeyer, Y Huang, R Jhala, ...
2017 IEEE Cybersecurity Development (SecDev), 69-76, 2017
302017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20