Sebastian Angel

Orcid: 0000-0002-3798-5590

According to our database1, Sebastian Angel authored at least 36 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MuCache: A General Framework for Caching in Microservice Graphs.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

2023
Executing Microservice Applications on Serverless, Correctly.
Proc. ACM Program. Lang., January, 2023

Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.
IACR Cryptol. ePrint Arch., 2023

Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs.
IACR Cryptol. ePrint Arch., 2023

Nimble: Rollback Protection for Confidential Cloud Services (extended version).
IACR Cryptol. ePrint Arch., 2023

On a Foundation Model for Operating Systems.
CoRR, 2023

Nimble: Rollback Protection for Confidential Cloud Services.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

2022
Addax: A fast, private, and accountable ad exchange infrastructure.
IACR Cryptol. ePrint Arch., 2022

Ibex: Privacy-preserving ad conversion tracking and bidding (full version).
IACR Cryptol. ePrint Arch., 2022

Incremental Offline/Online PIR.
Proceedings of the 31st USENIX Security Symposium, 2022

Optimizing Data-intensive Systems in Disaggregated Data Centers with TELEPORT.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

Rolis: a software approach to efficiently replicating multi-core transactions.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Ibex: Privacy-preserving Ad Conversion Tracking and Bidding.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Incremental Offline/Online PIR (extended version).
IACR Cryptol. ePrint Arch., 2021

Efficient Representation of Numerical Optimization Problems for SNARKs.
IACR Cryptol. ePrint Arch., 2021

Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

Bringing Decentralized Search to Decentralized Services.
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021

Packet Scheduling with Optional Client Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Understanding the Effect of Data Center Resource Disaggregation on Production DBMSs.
Proc. VLDB Endow., 2020

Verifiable state machines: Proofs that untrusted services operate correctly.
IACR Cryptol. ePrint Arch., 2020

Private resource allocators and their applications.
IACR Cryptol. ePrint Arch., 2020

Fault-tolerant and Transactional Stateful Serverless Workflows (extended version).
CoRR, 2020

Fault-tolerant and transactional stateful serverless workflows.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

A file system for safely interacting with untrusted USB flash drives.
Proceedings of the 12th USENIX Workshop on Hot Topics in Storage and File Systems, 2020

Disaggregation and the Application.
Proceedings of the 12th USENIX Workshop on Hot Topics in Cloud Computing, 2020

Rethinking Data Management Systems for Disaggregated Data Centers.
Proceedings of the 10th Conference on Innovative Data Systems Research, 2020

2019
Deferred Runtime Pipelining for contentious multicore software transactions.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
Proving the correct execution of concurrent services in zero-knowledge.
IACR Cryptol. ePrint Arch., 2018

What's a Little Leakage Between Friends?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2017
PIR with compressed queries and amortized query processing.
IACR Cryptol. ePrint Arch., 2017

2016
Defending against Malicious Peripherals with Cinch.
Proceedings of the 25th USENIX Security Symposium, 2016

Unobservable Communication over Fully Untrusted Infrastructure.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

2015
Harmful devices considered harmless.
CoRR, 2015

2014
End-to-end Performance Isolation Through Virtual Datacenters.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2013
Verifiable auctions for online ad exchanges.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

K-mulus: Strategies for BLAST in the Cloud.
Proceedings of the Parallel Processing and Applied Mathematics, 2013


  Loading...