Systems and method for malware detection YAO Danfeng, D Stefan, C Wu US Patent 8,763,127, 2014 | 258 | 2014 |
Flexible dynamic information flow control in Haskell D Stefan, A Russo, JC Mitchell, D Mazières Proceedings of the 4th ACM Symposium on Haskell, 95-106, 2011 | 203 | 2011 |
Hails: Protecting data privacy in untrusted web applications DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, JC Mitchell, A Russo 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 192 | 2012 |
Fast software AES encryption DA Osvik, JW Bos, D Stefan, D Canright Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 186 | 2010 |
Constant-time foundations for the new spectre era S Cauligi, C Disselkoen, K Gleissenthall, D Tullsen, D Stefan, T Rezk, ... Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020 | 123 | 2020 |
Protecting Users by Confining {JavaScript} with {COWL} D Stefan, EZ Yang, P Marchenko, A Russo, D Herman, B Karp, ... 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 115 | 2014 |
Ct-wasm: type-driven secure cryptography for the web ecosystem C Watt, J Renner, N Popescu, S Cauligi, D Stefan Proceedings of the ACM on Programming Languages 3 (POPL), 1-29, 2019 | 97 | 2019 |
FaCT: a DSL for timing-sensitive computation S Cauligi, G Soeller, B Johannesmeyer, F Brown, RS Wahby, J Renner, ... Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019 | 90 | 2019 |
Disjunction category labels D Stefan, A Russo, D Mazières, JC Mitchell Information Security Technology for Applications: 16th Nordic Conference on …, 2012 | 85 | 2012 |
Fast implementations of AES on various platforms JW Bos, DA Osvik, D Stefan Cryptology ePrint Archive, 2009 | 84 | 2009 |
Low discrepancy sequences for Monte Carlo simulations on reconfigurable platforms IL Dalal, D Stefan, J Harwayne-Gidansky 2008 International Conference on Application-Specific Systems, Architectures …, 2008 | 84 | 2008 |
Automatically eliminating speculative leaks from cryptographic code with blade M Vassena, C Disselkoen, K Gleissenthall, S Cauligi, RG Kıcı, R Jhala, ... Proceedings of the ACM on Programming Languages 5 (POPL), 1-30, 2021 | 83 | 2021 |
Eliminating cache-based timing attacks with instruction-based scheduling D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 83 | 2013 |
Addressing covert termination and timing channels in concurrent information flow systems D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Mazieres ACM SIGPLAN Notices 47 (9), 201-214, 2012 | 83 | 2012 |
Retrofitting fine grain isolation in the Firefox renderer S Narayan, C Disselkoen, T Garfinkel, N Froyd, E Rahm, S Lerner, ... 29th USENIX Security Symposium (USENIX Security 20), 699-716, 2020 | 77 | 2020 |
Robustness of keystroke-dynamics based biometrics against synthetic forgeries D Stefan, X Shu, DD Yao computers & security 31 (1), 109-121, 2012 | 75 | 2012 |
Flexible dynamic information flow control in the presence of exceptions D Stefan, D Mazières, JC Mitchell, A Russo Journal of Functional Programming 27, e5, 2017 | 67* | 2017 |
Fact: A flexible, constant-time programming language S Cauligi, G Soeller, F Brown, B Johannesmeyer, Y Huang, R Jhala, ... 2017 IEEE Cybersecurity Development (SecDev), 69-76, 2017 | 66 | 2017 |
Finding and preventing bugs in javascript bindings F Brown, S Narayan, RS Wahby, D Engler, R Jhala, D Stefan 2017 IEEE Symposium on Security and Privacy (SP), 559-578, 2017 | 64 | 2017 |
Swivel: Hardening {WebAssembly} against spectre S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, ... 30th USENIX Security Symposium (USENIX Security 21), 1433-1450, 2021 | 63 | 2021 |