Stefan Saroiu

Orcid: 0009-0007-1318-1719

According to our database1, Stefan Saroiu authored at least 62 papers between 2000 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to memory security and trusted computing".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Poster: Towards Multi-Stakeholder Clouds.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

Towards Multi-Stakeholder Clouds.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

2023
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing.
Proc. Priv. Enhancing Technol., July, 2023

Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

Accelerating Open RAN Research Through an Enterprise-scale 5G Testbed.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

2022
MOESI-prime: preventing coherence-induced hammering in commodity workloads.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022

The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses.
Proceedings of the IEEE International Reliability Physics Symposium, 2022

2021
MegaMind: a platform for security & privacy extensions for voice assistants.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

Stop! Hammer time: rethinking our approach to rowhammer mitigations.
Proceedings of the HotOS '21: Workshop on Hot Topics in Operating Systems, 2021

2020
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

2019
enClosure: Group Communication via Encounter Closures.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

2016
fTPM: A Software-Only Implementation of a TPM Chip.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Policy-Carrying Data: A Privacy Abstraction for Attaching Terms of Service to Mobile Data.
Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015

Kahawai: High-Quality Mobile Gaming Using GPU Offload.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Protecting Data on Smartphones and Tablets from Memory Attacks.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
cTPM: A Cloud TPM for Cross-Device Trusted Applications.
login Usenix Mag., 2014

Demo: Kahawai: high-quality mobile gaming using GPU offload.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Zero-effort payments: design, deployment, and lessons.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Using ARM trustzone to build a trusted language runtime for mobile applications.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
Splitting the bill for mobile data with SIMlets.
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013

2012
Keeping information safe from social networking apps.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

An Operating System for the Home.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Software abstractions for trusted sensors.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Delusional boot: securing hypervisors without massive re-engineering.
Proceedings of the European Conference on Computer Systems, 2012

2011
Trusted language runtime (TLR): enabling trusted applications on smartphones.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Home automation in the wild: challenges and opportunities.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
I am a sensor, and I approve this message.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Using Trusted Sensors to Monitor Patients' Habits.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Glasnost: Enabling End Users to Detect Traffic Differentiation.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Volley: Automated Data Placement for Geo-Distributed Cloud Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

MAUI: making smartphones last longer with code offload.
Proceedings of the 8th International Conference on Mobile Systems, 2010

The home needs an operating system (and an app store).
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

2009
5th international workshop on networking meets databases (NetDB 2009).
SIGMOD Rec., 2009

Enabling new mobile applications with location proofs.
Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, 2009

Bunker: A Privacy-Oriented Platform for Network Tracing.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

BlueMonarch: a system for evaluating bluetooth applications in the wild.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Lockr: better privacy for social networks.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Lockr: social access control for web 2.0.
Proceedings of the first Workshop on Online Social Networks, 2008

SpySaver: using incentives to address spyware.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Satellitelab: adding heterogeneity to planetary-scale network testbeds.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

CILoS: a CDMA indoor localization system.
Proceedings of the UbiComp 2008: Ubiquitous Computing, 10th International Conference, 2008

Itrustpage: a user-assisted anti-phishing tool.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

2007
Finding Content in File-Sharing Networks When You Can't Even Spell.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

Characterizing residential broadband networks.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Exploiting Social Interactions in Mobile Systems.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007

Tamper Resistant Network Tracing.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2006
A preliminary investigation of worm infections in a bluetooth environment.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Monarch: a tool to emulate transport protocol flowsover the internet at large.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2004
Measurement and Analysis of Spyware in a University Environment.
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

2003
Measuring and analyzing the characteristics of Napster and Gnutella hosts.
Multim. Syst., 2003

SkipNet: A Scalable Overlay Network with Practical Locality Properties.
Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, 2003

Measurement, modeling, and analysis of a peer-to-peer file-sharing workload.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

2002
King: estimating latency between arbitrary internet end hosts.
Comput. Commun. Rev., 2002

A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems.
Comput. Commun. Rev., 2002

An Analysis of Internet Content Delivery Systems.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Dynamically Fault-Tolerant Content Addressable Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

2001
Predictability requirements of a soft modem.
Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, 2001

Two Case Studies in Predictable Application Scheduling Using Rialto/NT.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

2000
Self-Organizing Data Sharing Communities with SAGRES.
Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 2000


  Loading...