File System Logging versus Clustering: A Performance Comparison. MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ... USENIX, 249-264, 1995 | 204 | 1995 |
Systems and method for malware detection YAO Danfeng, D Stefan, C Wu US Patent 8,763,127, 2014 | 186 | 2014 |
Flexible dynamic information flow control in Haskell D Stefan, A Russo, JC Mitchell, D Mazières Proceedings of the 4th ACM Symposium on Haskell, 95-106, 2011 | 166 | 2011 |
Hails: Protecting data privacy in untrusted web applications DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, JC Mitchell, A Russo 10th {USENIX} Symposium on Operating Systems Design and Implementation …, 2012 | 162 | 2012 |
Fast software AES encryption DA Osvik, JW Bos, D Stefan, D Canright International Workshop on Fast Software Encryption, 75-93, 2010 | 136 | 2010 |
Protecting Users by Confining JavaScript with {COWL} D Stefan, EZ Yang, P Marchenko, A Russo, D Herman, B Karp, ... 11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014 | 90 | 2014 |
Addressing covert termination and timing channels in concurrent information flow systems D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Mazieres ACM SIGPLAN Notices 47 (9), 201-214, 2012 | 75 | 2012 |
Fast Implementations of AES on Various Platforms. JW Bos, DA Osvik, D Stefan IACR Cryptol. ePrint Arch. 2009, 501, 2009 | 71 | 2009 |
Eliminating cache-based timing attacks with instruction-based scheduling D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières European Symposium on Research in Computer Security, 718-735, 2013 | 70 | 2013 |
Disjunction category labels D Stefan, A Russo, D Mazières, JC Mitchell Nordic conference on secure IT systems, 223-239, 2011 | 65 | 2011 |
Robustness of keystroke-dynamics based biometrics against synthetic forgeries D Stefan, X Shu, DD Yao computers & security 31 (1), 109-121, 2012 | 60 | 2012 |
Low discrepancy sequences for Monte Carlo simulations on reconfigurable platforms IL Dalal, D Stefan, J Harwayne-Gidansky 2008 International Conference on Application-Specific Systems, Architectures …, 2008 | 55 | 2008 |
Flexible dynamic information flow control in the presence of exceptions D Stefan, A Russo, JC Mitchell, D Mazières arXiv preprint arXiv:1207.1457, 2012 | 53 | 2012 |
Data-provenance verification for secure hosts K Xu, H Xiong, C Wu, D Stefan, D Yao IEEE Transactions on Dependable and Secure Computing 9 (2), 173-183, 2011 | 48 | 2011 |
Information-flow control for programming on encrypted data JC Mitchell, R Sharma, D Stefan, J Zimmerman 2012 IEEE 25th Computer Security Foundations Symposium, 45-60, 2012 | 45 | 2012 |
Keystroke-dynamics authentication against synthetic forgeries D Stefan, D Yao 6th International Conference on Collaborative Computing: Networking …, 2010 | 42 | 2010 |
User-assisted host-based detection of outbound malware traffic H Xiong, P Malhotra, D Stefan, C Wu, D Yao International Conference on Information and Communications Security, 293-307, 2009 | 39 | 2009 |
A hardware framework for the fast generation of multiple long-period random number streams IL Dalal, D Stefan Proceedings of the 16th international ACM/SIGDA symposium on Field …, 2008 | 34 | 2008 |
Ct-wasm: type-driven secure cryptography for the web ecosystem C Watt, J Renner, N Popescu, S Cauligi, D Stefan Proceedings of the ACM on Programming Languages 3 (POPL), 1-29, 2019 | 30 | 2019 |
Fact: A flexible, constant-time programming language S Cauligi, G Soeller, F Brown, B Johannesmeyer, Y Huang, R Jhala, ... 2017 IEEE Cybersecurity Development (SecDev), 69-76, 2017 | 30 | 2017 |