Marcus Peinado

Orcid: 0009-0001-4711-0675

According to our database1, Marcus Peinado authored at least 48 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability.
Proceedings of the 32nd USENIX Security Symposium, 2023

Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Spacelord: Private and Secure Smart Space Sharing.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
SurfaceFleet: Exploring Distributed Interactions Unbounded from Device, Application, User, and Time.
Proceedings of the UIST '20: The 33rd Annual ACM Symposium on User Interface Software and Technology, 2020

The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Dominance as a New Trusted Computing Primitive for the Internet of Things.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2017
Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Proceedings of the 26th USENIX Security Symposium, 2017

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
Proceedings of the 26th USENIX Security Symposium, 2017

High-Resolution Side Channels for Untrusted Operating Systems.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
RETracer: triaging crashes by reverse execution from partial memory dumps.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Shielding Applications from an Untrusted Cloud with Haven.
ACM Trans. Comput. Syst., 2015

Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Measurement and Analysis of Traffic Exchange Services.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2013
deDacota: toward preventing server-side XSS via automatic code and data separation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Fay: Extensible Distributed Tracing from Kernels to Clusters.
ACM Trans. Comput. Syst., 2012

STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Tracking Rootkit Footprints with a Practical Memory Analysis System.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Fay: extensible distributed tracing from kernels to clusters.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

2009
Fast byte-granularity software fault isolation.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

Mapping kernel objects to enable systematic integrity checking.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Tupni: automatic reverse engineering of input formats.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Bouncer: securing software by blocking bad input.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

2004
NGSCB: A Trusted Open System.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Digital rights management for digital cinema.
Multim. Syst., 2003

Parallel 'go with the winners' algorithms in distributed memory models.
J. Parallel Distributed Comput., 2003

A Trusted Open Platform.
Computer, 2003

The Darknet and the Future of Content Protection.
Proceedings of the Digital Rights Management, 2003

2002
The Darknet and the Future of Content Protection.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

Authenticated Operation of Open Computing Devices.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Go with the Winners Algorithms for Cliques in Random Graphs.
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001

2000
Hiding Cliques for Cryptographic Security.
Des. Codes Cryptogr., 2000

1998
Random Generation of Embedded Graphs and an Extension to Dobrushin Uniqueness (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Speeding up Discrete Log and Factoring Based Schemes via Precomputations.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Algorithms for Almost-uniform Generation with an Unbiased Binary Source.
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998

1997
Design and Performance of Parallel and Distributed Approximation Algorithms for Maxcut.
J. Parallel Distributed Comput., 1997

'Go with the winners' Generators with Applications to Molecular Modeling.
Proceedings of the Randomization and Approximation Techniques in Computer Science, 1997

Highly Parallel Cryptographic Attacks.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 1997

Parallel 'Go with the Winners' Algorithms in the LogP Model.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

1995
A highly parallel algorithm to approximate MaxCut on distributed memory architectures.
Proceedings of IPPS '95, 1995

Improved Lower Bounds for the Randomized Boppana-Halldórsson Algorithm for MAXCLIQUE.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1994
Hard Graphs for the Randomized Boppana-Halldörsson Algorithm for MAXCLIQUE.
Nord. J. Comput., 1994

Hard Graphs for Randomized Subgraph Exclusion Algorithms.
Proceedings of the Algorithm Theory, 1994

1993
Experiments with polynomial-time CLIQUE approximation algorithms on very large graphs.
Proceedings of the Cliques, 1993


  Loading...