Amit Levy
Cited by
Cited by
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX Security Symposium 316, 2009
Hails: Protecting data privacy in untrusted web applications
DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
10th Symposium on Operating Systems Design and Implementation (OSDI), 47-60, 2012
Comet: An active distributed key-value store.
R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy
OSDI, 323-336, 2010
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Maziéres
Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
European Symposium on Research in Computer Security, 718-735, 2013
Multiprogramming a 64kb computer safely and efficiently
A Levy, B Campbell, B Ghena, DB Giffin, P Pannuto, P Dutta, P Levis
Proceedings of the 26th Symposium on Operating Systems Principles, 234-251, 2017
Beetle: Flexible communication for bluetooth low energy
AA Levy, J Hong, L Riliskis, P Levis, K Winstein
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Ownership is theft: Experiences building an embedded OS in Rust
A Levy, MP Andersen, B Campbell, D Culler, P Dutta, B Ghena, P Levis, ...
Proceedings of the 8th Workshop on Programming Languages and Operating …, 2015
New directions for self-destructing data
R Geambasu, T Kohno, A Krishnamurthy, A Levy, HM Levy, P Gardner, ...
University of Washington, Tech. Rep. UW-CSE-11-08-01, 2011
The case for writing a kernel in Rust
A Levy, B Campbell, B Ghena, P Pannuto, P Dutta, P Levis
Proceedings of the 8th Asia-Pacific Workshop on Systems, 1-7, 2017
Stickler: Defending against malicious content distribution networks in an unmodified browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems
P Buiras, A Levy, D Stefan, A Russo, D Mazières
8th International Symposium on Trustworthy Global Computing (TGC 2013), 2013
Blade: A data center garbage collector
D Terei, A Levy
arXiv preprint arXiv:1504.02578, 2015
A networked embedded system platform for the post-mote era
P Pannuto, MP Andersen, T Bauer, B Campbell, A Levy, D Culler, P Levis, ...
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
Don't talk unless i say so! securing the internet of things with default-off networking
J Hong, A Levy, L Riliskis, P Levis
2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018
Building secure systems with LIO
D Stefan, A Levy, A Russo, D Mazières
ACM SIGPLAN Notices 49 (12), 93-94, 2014
Position paper: Progressive memory safety for webassembly
C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
Design considerations for low power internet protocols
H Ayers, PT Crews, HHK Teo, C McAvity, A Levy, P Levis
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems …, 2018
Hails: Protecting data privacy in untrusted web applications
D Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
Journal of Computer Security 25 (4-5), 427-461, 2017
Security and the average programmer
D Giffin, S Heule, A Levy, D Mazieres, J Mitchell, A Russo, A Shen, ...
Proceedings of POST, 2014
The system can't perform the operation now. Try again later.
Articles 1–20