Manuel Costa

Affiliations:
  • Microsoft Research


According to our database1, Manuel Costa authored at least 42 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Why Should I Trust Your Code?
Commun. ACM, January, 2024

2023
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
ACM Queue, 2023

Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability.
Proc. VLDB Endow., 2023

COCOAEXPO: Confidential Containers via Attested Execution Policies.
CoRR, 2023

2022
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement.
CoRR, 2022

IA-CCF: Individual Accountability for Permissioned Ledgers.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

2021
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use.
ACM Queue, 2021

PAC: Practical Accountability for CCF.
CoRR, 2021

Toward confidential cloud computing.
Commun. ACM, 2021

AMP: authentication of media via provenance.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021

2020
AMP: Authentication of Media via Provenance.
CoRR, 2020

2018
EnclaveDB: A Secure Database Using SGX.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Project snowflake: non-blocking safe manual memory management in .NET.
Proc. ACM Program. Lang., 2017

Managing Spacecraft Memory Buffers with Concurrent Data Collection and Downlink.
J. Aerosp. Inf. Syst., 2017

The Pyramid Scheme: Oblivious RAM for Trusted Processors.
CoRR, 2017

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

Simple, fast, and safe manual memory management.
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017

2016
Oblivious Multi-Party Machine Learning on Trusted Processors.
Proceedings of the 25th USENIX Security Symposium, 2016

A design and verification methodology for secure isolated regions.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

2015
VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Broom: Sweeping Out Garbage Collection from Big Data Systems.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Observing and Preventing Leakage in MapReduce.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Docovery: toward generic automatic document recovery.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

2010
Dynamically checking ownership policies in concurrent c/c++ programs.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

2009
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.
Proceedings of the 18th USENIX Security Symposium, 2009

Fast byte-granularity software fault isolation.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

2008
Vigilante: End-to-end containment of Internet worm epidemics.
ACM Trans. Comput. Syst., 2008

Preventing Memory Error Exploits with WIT.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Better bug reporting with better privacy.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
End-to-end containment of internet worm epidemics.
PhD thesis, 2007

Bouncer: securing software by blocking bad input.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

2006
Securing Software by Enforcing Data-flow Integrity.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

2005
Vigilante: end-to-end containment of internet worms.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

3D environments as social learning tools: the VIRTU@LIS experience.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2005

Debunking Some Myths About Structured and Unstructured Overlays.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

A First Look at Peer-to-Peer Worms: Threats and Defenses.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2004
Should we build Gnutella on a structured overlay?
Comput. Commun. Rev., 2004

PIC: Practical Internet Coordinates for Distance Estimation.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Performance and Dependability of Structured Peer-to-Peer Overlays.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Mobile Augmented Reality for Environmental Management (MARE).
Proceedings of the 24th Annual Conference of the European Association for Computer Graphics, 2003

1996
Lightweight Logging for Lazy Release Consistent Distributed Shared Memory.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996

Efficient and Flexible Object Sharing.
Proceedings of the 1996 International Conference on Parallel Processing, 1996


  Loading...