Michael Walfish

Affiliations:
  • New York University, Courant Institute of Mathematical Sciences, NY, USA


According to our database1, Michael Walfish authored at least 49 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Zombie: Middleboxes that Don't Snoop.
IACR Cryptol. ePrint Arch., 2023

2022
Less is more: refinement proofs for probabilistic proofs.
IACR Cryptol. ePrint Arch., 2022

2021
Zero-Knowledge Middleboxes.
IACR Cryptol. ePrint Arch., 2021

2020
Cobra: Making Transactional Key-Value Stores Verifiably Serializable.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
Detecting Incorrect Behavior of Cloud Databases as an Outsider.
CoRR, 2019

2017
Doubly-efficient zkSNARKs without trusted setup.
IACR Cryptol. ePrint Arch., 2017

Full accounting for verifiable outsourcing.
IACR Cryptol. ePrint Arch., 2017

The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Pretzel: Email encryption and provider-supplied functions are compatible.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

2016
Defending against Malicious Peripherals with Cinch.
Proceedings of the 25th USENIX Security Symposium, 2016

Scalable and Private Media Consumption with Popcorn.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
Verifiable ASICs.
IACR Cryptol. ePrint Arch., 2015

Scalable and private media consumption with Popcorn.
IACR Cryptol. ePrint Arch., 2015

Harmful devices considered harmless.
CoRR, 2015

Verifying computations without reexecuting them.
Commun. ACM, 2015

Yesquel: scalable sql storage for web applications.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

Yesquel: Scalable SQL storage for Web applications.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

Taming uncertainty in distributed systems with help from the network.
Proceedings of the Tenth European Conference on Computer Systems, 2015

2014
Efficient RAM and control flow in verifiable outsourced computation.
IACR Cryptol. ePrint Arch., 2014

Verifiable computation using multiple provers.
IACR Cryptol. ePrint Arch., 2014

A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

2013
Verifying computations with state.
IACR Cryptol. ePrint Arch., 2013

Verifying computations without reexecuting them: from theoretical possibility to near-practicality.
Electron. Colloquium Comput. Complex., 2013

A Hybrid Architecture for Interactive Verifiable Computation.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Verifiable auctions for online ad exchanges.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Improving Availability in Distributed Systems with Failure Informers.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Verifying the correctness of remote executions: from wild implausibility to near practicality.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013


2012
Taking proof-based verified computation a few steps closer to practicality (extended version).
IACR Cryptol. ePrint Arch., 2012

Resolving the conflict between generality and plausibility in verified computation.
IACR Cryptol. ePrint Arch., 2012

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Treehouse: Javascript Sandboxes to Help Web Developers Help Themselves.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Making argument systems for outsourced computation practical (sometimes).
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Depot: Cloud Storage with Minimal Trust.
ACM Trans. Comput. Syst., 2011

Detecting failures in distributed systems with the Falcon spy network.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Repair from a Chair: Computer Repair as an Untrusted Cloud Service.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

The web interface should be radically refactored.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Verifying and enforcing network paths with icing.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
DDoS defense by offense.
ACM Trans. Comput. Syst., 2010

2009
No Time for Asynchrony.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

A Policy Framework for the Future Internet.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2007
Defending networked resources against floods of unwelcome requests.
PhD thesis, 2007

World Wide Web Without Walls.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2006
Distributed Quota Enforcement for Spam Control.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

2005
Peering Peer-to-Peer Providers.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2004
A layered naming architecture for the internet.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Middleboxes No Longer Considered Harmful.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Untangling the Web from DNS.
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

2003
Semantic-Free Referencing in Linked Distributed Systems.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003


  Loading...