Vigilante: End-to-end containment of internet worms M Costa, J Crowcroft, M Castro, A Rowstron, L Zhou, L Zhang, P Barham Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 961 | 2005 |
VC3: Trustworthy data analytics in the cloud using SGX F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ... 2015 IEEE symposium on security and privacy, 38-54, 2015 | 759 | 2015 |
Oblivious multi-party machine learning on trusted processors. O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... USENIX Security Symposium 16, 10-12, 2016 | 576 | 2016 |
Securing software by enforcing data-flow integrity M Castro, M Costa, T Harris Proceedings of the 7th symposium on Operating systems design and …, 2006 | 495 | 2006 |
PIC: Practical Internet coordinates for distance estimation M Costa, M Castro, R Rowstron, P Key 24th International Conference on Distributed Computing Systems, 2004 …, 2004 | 464 | 2004 |
Preventing memory error exploits with WIT P Akritidis, C Cadar, C Raiciu, M Costa, M Castro 2008 IEEE Symposium on Security and Privacy (sp 2008), 263-277, 2008 | 415 | 2008 |
Containment of worms M Costa, M Castro, A Rowstron, J Crowcroft US Patent 7,603,715, 2009 | 369 | 2009 |
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. P Akritidis, M Costa, M Castro, S Hand USENIX Security Symposium 10, 2009 | 365 | 2009 |
EnclaveDB: A secure database using SGX C Priebe, K Vaswani, M Costa 2018 IEEE Symposium on Security and Privacy (SP), 264-278, 2018 | 293 | 2018 |
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa USENIX Security Symposium, 217-233, 2017 | 274 | 2017 |
Performance and dependability of structured peer-to-peer overlays M Castro, M Costa, A Rowstron International Conference on Dependable Systems and Networks, 2004, 9-18, 2004 | 242 | 2004 |
Fast byte-granularity software fault isolation M Castro, M Costa, JP Martin, M Peinado, P Akritidis, A Donnelly, ... Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009 | 241 | 2009 |
Bouncer: Securing software by blocking bad input M Costa, M Castro, L Zhou, L Zhang, M Peinado Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 213 | 2007 |
A first look at peer-to-peer worms: Threats and defenses L Zhou, L Zhang, F McSherry, N Immorlica, M Costa, S Chien Peer-to-Peer Systems IV: 4th International Workshop, IPTPS 2005, Ithaca, NY …, 2005 | 213 | 2005 |
Debunking some myths about structured and unstructured overlays M Castro, M Costa, A Rowstron Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005 | 207 | 2005 |
Should we build Gnutella on a structured overlay? M Castro, M Costa, A Rowstron ACM SIGCOMM Computer Communication Review 34 (1), 131-136, 2004 | 163 | 2004 |
Better bug reporting with better privacy M Castro, M Costa, JP Martin ACM SIGOPS Operating Systems Review 42 (2), 319-328, 2008 | 144 | 2008 |
Broom: Sweeping out garbage collection from big data systems I Gog, J Giceva, M Schwarzkopf, K Vaswani, D Vytiniotis, G Ramalingam, ... 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015 | 118 | 2015 |
Data randomization C Cadar, P Akritidis, M Costa, JP Martin, M Castro Technical Report TR-2008-120, Microsoft Research, 2008. Cited on, 2008 | 114 | 2008 |
Observing and preventing leakage in MapReduce O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 99 | 2015 |