Seguir
Manuel Costa
Manuel Costa
Microsoft Research
Dirección de correo verificada de microsoft.com
Título
Citado por
Citado por
Año
Vigilante: End-to-end containment of internet worms
M Costa, J Crowcroft, M Castro, A Rowstron, L Zhou, L Zhang, P Barham
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
9972005
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE symposium on security and privacy, 38-54, 2015
8692015
Oblivious {Multi-Party} machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016
6882016
Securing software by enforcing data-flow integrity.
M Castro, M Costa, T Harris
OSDI 6, 147-160, 2006
5472006
PIC: Practical Internet coordinates for distance estimation
M Costa, M Castro, R Rowstron, P Key
24th International Conference on Distributed Computing Systems, 2004 …, 2004
4642004
Preventing memory error exploits with WIT
P Akritidis, C Cadar, C Raiciu, M Costa, M Castro
2008 IEEE Symposium on Security and Privacy (sp 2008), 263-277, 2008
4512008
EnclaveDB: A secure database using SGX
C Priebe, K Vaswani, M Costa
2018 IEEE Symposium on Security and Privacy (SP), 264-278, 2018
4122018
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.
P Akritidis, M Costa, M Castro, S Hand
USENIX Security Symposium 10, 96, 2009
4102009
Containment of worms
M Costa, M Castro, A Rowstron, J Crowcroft
US Patent 7,603,715, 2009
3912009
Strong and efficient cache {Side-Channel} protection using hardware transactional memory
D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa
26th USENIX Security Symposium (USENIX Security 17), 217-233, 2017
3402017
Fast byte-granularity software fault isolation
M Castro, M Costa, JP Martin, M Peinado, P Akritidis, A Donnelly, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2722009
Performance and dependability of structured peer-to-peer overlays
M Castro, M Costa, A Rowstron
International Conference on Dependable Systems and Networks, 2004, 9-18, 2004
2462004
Bouncer: Securing software by blocking bad input
M Costa, M Castro, L Zhou, L Zhang, M Peinado
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
2172007
A first look at peer-to-peer worms: Threats and defenses
L Zhou, L Zhang, F McSherry, N Immorlica, M Costa, S Chien
International Workshop on Peer-to-Peer Systems, 24-35, 2005
2132005
Debunking some myths about structured and unstructured overlays
M Castro, M Costa, A Rowstron
Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005
2102005
Should we build Gnutella on a structured overlay?
M Castro, M Costa, A Rowstron
ACM SIGCOMM Computer Communication Review 34 (1), 131-136, 2004
1622004
Better bug reporting with better privacy
M Castro, M Costa, JP Martin
ACM SIGOPS Operating Systems Review 42 (2), 319-328, 2008
1552008
Broom: Sweeping out garbage collection from big data systems
I Gog, J Giceva, M Schwarzkopf, K Vaswani, D Vytiniotis, G Ramalingam, ...
15th Workshop on Hot Topics in Operating Systems (HotOS XV), 2015
1302015
Data randomization
C Cadar, P Akritidis, M Costa, JP Martin, M Castro
Technical Report TR-2008-120, Microsoft Research, 2008. Cited on, 2008
1262008
Observing and preventing leakage in MapReduce
O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1102015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20