Amit Levy
Citado por
Citado por
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX security symposium 316, 2009
Hails: Protecting data privacy in untrusted web applications
DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
10th Symposium on Operating Systems Design and Implementation (OSDI), 47-60, 2012
Comet: An active distributed key-value store.
R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy
OSDI, 323-336, 2010
Multiprogramming a 64kb computer safely and efficiently
A Levy, B Campbell, B Ghena, DB Giffin, P Pannuto, P Dutta, P Levis
Proceedings of the 26th Symposium on Operating Systems Principles, 234-251, 2017
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Maziéres
Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
European Symposium on Research in Computer Security, 718-735, 2013
Ownership is theft: Experiences building an embedded OS in Rust
A Levy, MP Andersen, B Campbell, D Culler, P Dutta, B Ghena, P Levis, ...
Proceedings of the 8th Workshop on Programming Languages and Operating …, 2015
Beetle: Flexible communication for bluetooth low energy
AA Levy, J Hong, L Riliskis, P Levis, K Winstein
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
The case for writing a kernel in rust
A Levy, B Campbell, B Ghena, P Pannuto, P Dutta, P Levis
Proceedings of the 8th Asia-Pacific Workshop on Systems, 1-7, 2017
New directions for self-destructing data
R Geambasu, T Kohno, A Krishnamurthy, A Levy, HM Levy, P Gardner, ...
University of Washington, Tech. Rep. UW-CSE-11-08-01, 2011
Stickler: Defending against malicious content distribution networks in an unmodified browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
Position paper: Progressive memory safety for webassembly
C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems
P Buiras, A Levy, D Stefan, A Russo, D Mazières
8th International Symposium on Trustworthy Global Computing (TGC 2013), 2013
Blade: A data center garbage collector
D Terei, A Levy
arXiv preprint arXiv:1504.02578, 2015
Don't talk unless i say so! securing the internet of things with default-off networking
J Hong, A Levy, L Riliskis, P Levis
2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018
Hails: Protecting data privacy in untrusted web applications
D Giffin, A Levy, D Stefan, D Terei, D Mazières, J Mitchell, A Russo
Journal of Computer Security 25 (4-5), 427-461, 2017
Building comprehensible access control for the Internet of Things using beetle
J Hong, A Levy, P Levis
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
A networked embedded system platform for the post-mote era
P Pannuto, MP Andersen, T Bauer, B Campbell, A Levy, D Culler, P Levis, ...
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
Building secure systems with LIO
D Stefan, A Levy, A Russo, D Mazières
ACM SIGPLAN Notices 49 (12), 93-94, 2014
Design considerations for low power internet protocols
H Ayers, P Crews, H Teo, C McAvity, A Levy, P Levis
2020 16th International Conference on Distributed Computing in Sensor …, 2020
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20