d Abstract) We extend the model of [VRV94] to express strong time-outs (and pre-emption): if an event A does not happen through time t, cause event B to happen at time t. Such con...
This note is an informal report about the Shadow Program Committee experiment that I organized for Sigcomm 2005. It (i) discusses the motivation for a Shadow Program Committee (PC...
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
The rapid development of network technologies has made the web a huge information source with its own characteristics. In most cases, traditional database-based technologies are no...
We present a divide-and-conquer method, called DiConic, for automatic addition of failsafe fault-tolerance to distributed programs, where a failsafe program guarantees to meet its...