Alec Wolman

Orcid: 0009-0001-3484-7360

Affiliations:
  • Microsoft


According to our database1, Alec Wolman authored at least 66 papers between 1991 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2018, "For contributions to trusted mobile systems and service".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023


Accelerating Open RAN Research Through an Enterprise-scale 5G Testbed.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

2022
MOESI-prime: preventing coherence-induced hammering in commodity workloads.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022

The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses.
Proceedings of the IEEE International Reliability Physics Symposium, 2022

2021
MegaMind: a platform for security & privacy extensions for voice assistants.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

Stop! Hammer time: rethinking our approach to rowhammer mitigations.
Proceedings of the HotOS '21: Workshop on Hot Topics in Operating Systems, 2021

2020
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

2016
fTPM: A Software-Only Implementation of a TPM Chip.
Proceedings of the 25th USENIX Security Symposium, 2016

MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
Outatime: Using Speculation to Enable Low-Latency Continuous Interaction for Mobile Cloud Gaming.
GetMobile Mob. Comput. Commun., 2015

Policy-Carrying Data: A Privacy Abstraction for Attaching Terms of Service to Mobile Data.
Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015

Kahawai: High-Quality Mobile Gaming Using GPU Offload.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Prime: a framework for co-located multi-device apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

dJay: enabling high-density multi-tenancy for cloud gaming servers with dynamic cost-benefit GPU load balancing.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

Protecting Data on Smartphones and Tablets from Memory Attacks.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
cTPM: A Cloud TPM for Cross-Device Trusted Applications.
login Usenix Mag., 2014

Demo: DeLorean: using speculation to enable low-latency continuous interaction for mobile cloud gaming.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Demo: Kahawai: high-quality mobile gaming using GPU offload.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Zero-effort payments: design, deployment, and lessons.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Using ARM trustzone to build a trusted language runtime for mobile applications.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
The Edge of the Cloud.
IEEE Pervasive Comput., 2013

Splitting the bill for mobile data with SIMlets.
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013

2012
Software abstractions for trusted sensors.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Poster: supporting collaborative sensing applications.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Helping mobile apps bootstrap with fewer users.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Delusional boot: securing hypervisors without massive re-engineering.
Proceedings of the European Conference on Computer Systems, 2012

2011
Trusted language runtime (TLR): enabling trusted applications on smartphones.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

2010
I am a sensor, and I approve this message.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Using Trusted Sensors to Monitor Patients' Habits.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Dyson: An Architecture for Extensible Wireless LANs.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Stout: An Adaptive Interface to Scalable Cloud Storage.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Virtual Compass: Relative Positioning to Sense Mobile Social Interactions.
Proceedings of the Pervasive Computing, 8th International Conference, 2010

Volley: Automated Data Placement for Geo-Distributed Cloud Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Centrifuge: Integrated Lease Management and Partitioning for Cloud Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

MAUI: making smartphones last longer with code offload.
Proceedings of the 8th International Conference on Mobile Systems, 2010

2009
Enabling new mobile applications with location proofs.
Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, 2009

Bunker: A Privacy-Oriented Platform for Network Tracing.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

BlueMonarch: a system for evaluating bluetooth applications in the wild.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Lockr: better privacy for social networks.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Designing High-Performance Enterprise Wi-FiNetworks.
login Usenix Mag., 2008

Lockr: social access control for web 2.0.
Proceedings of the first Workshop on Online Social Networks, 2008

SpySaver: using incentives to address spyware.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Designing High Performance Enterprise Wi-Fi Networks.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

An Architecture for Extensible Wireless LANs.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008

Itrustpage: a user-assisted anti-phishing tool.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

2007
Beacon-Stuffing: Wi-Fi without Associations.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

A Location-Based Management System for Enterprise Wireless LANs.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Wireless wakeups revisited: energy management for voip over wi-fi smartphones.
Proceedings of the 5th International Conference on Mobile Systems, 2007

Tamper Resistant Network Tracing.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2006
Enhancing the security of corporate Wi-Fi ntworks using DAIR.
Proceedings of the 4th International Conference on Mobile Systems, 2006

2004
Reconsidering wireless systems with multiple radios.
Comput. Commun. Rev., 2004

FUSE: Lightweight Guaranteed Distributed Failure Notification.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks.
Proceedings of the 1st International Conference on Broadband Networks (BROADNETS 2004), 2004

2003
SkipNet: A Scalable Overlay Network with Practical Locality Properties.
Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, 2003

Efficient Recovery from Organizational Disconnects in SkipNet.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2001
Measurement and Analysis of a Streaming Media Workload.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

1999
Organization-Based Analysis of Web-Object Sharing and Caching.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

On the scale and performance of cooperative Web proxy caching.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

1996
The Structure and Performance of Interpreters.
Proceedings of the ASPLOS-VII Proceedings, 1996

1994
Latency Analysis of TCP on an ATM Network.
Proceedings of the USENIX Winter 1994 Technical Conference, 1994

1993
X Through the Firewall, and Other Application Relay.
Proceedings of the Summer 1993 USENIX Conference, Cincinnati, OH, USA, June 21-25, 1993, 1993

1992
Replicating the Procedure Call Abstraction.
Proceedings of the Second Workshop on the Management of Replicated Data, 1992

1991
A General Tool for Replicating Distributed Services.
Proceedings of the First International Conference on Parallel and Distributed Information Systems (PDIS 1991), 1991


  Loading...