Follow
Deian Stefan
Title
Cited by
Cited by
Year
Systems and method for malware detection
YAO Danfeng, D Stefan, C Wu
US Patent 8,763,127, 2014
2582014
Flexible dynamic information flow control in Haskell
D Stefan, A Russo, JC Mitchell, D Mazières
Proceedings of the 4th ACM Symposium on Haskell, 95-106, 2011
2032011
Hails: Protecting data privacy in untrusted web applications
D Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
Journal of Computer Security 25 (4-5), 427-461, 2017
1962017
Fast software AES encryption
DA Osvik, JW Bos, D Stefan, D Canright
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
1862010
Constant-time foundations for the new spectre era
S Cauligi, C Disselkoen, K Gleissenthall, D Tullsen, D Stefan, T Rezk, ...
Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020
1202020
Protecting Users by Confining {JavaScript} with {COWL}
D Stefan, EZ Yang, P Marchenko, A Russo, D Herman, B Karp, ...
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
1142014
Ct-wasm: type-driven secure cryptography for the web ecosystem
C Watt, J Renner, N Popescu, S Cauligi, D Stefan
Proceedings of the ACM on Programming Languages 3 (POPL), 1-29, 2019
942019
Fact: a DSL for timing-sensitive computation
S Cauligi, G Soeller, B Johannesmeyer, F Brown, RS Wahby, J Renner, ...
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019
872019
Fast implementations of AES on various platforms
JW Bos, DA Osvik, D Stefan
Cryptology ePrint Archive, 2009
842009
Low discrepancy sequences for Monte Carlo simulations on reconfigurable platforms
IL Dalal, D Stefan, J Harwayne-Gidansky
2008 International Conference on Application-Specific Systems, Architectures …, 2008
842008
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Mazieres
ACM SIGPLAN Notices 47 (9), 201-214, 2012
832012
Disjunction category labels
D Stefan, A Russo, D Mazières, JC Mitchell
Information Security Technology for Applications: 16th Nordic Conference on …, 2012
832012
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
822013
Automatically eliminating speculative leaks from cryptographic code with blade
M Vassena, C Disselkoen, K Gleissenthall, S Cauligi, RG Kıcı, R Jhala, ...
Proceedings of the ACM on Programming Languages 5 (POPL), 1-30, 2021
812021
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
computers & security 31 (1), 109-121, 2012
772012
Retrofitting fine grain isolation in the Firefox renderer
S Narayan, C Disselkoen, T Garfinkel, N Froyd, E Rahm, S Lerner, ...
29th USENIX Security Symposium (USENIX Security 20), 699-716, 2020
742020
Fact: A flexible, constant-time programming language
S Cauligi, G Soeller, F Brown, B Johannesmeyer, Y Huang, R Jhala, ...
2017 IEEE Cybersecurity Development (SecDev), 69-76, 2017
682017
Pretend synchrony: synchronous verification of asynchronous distributed programs
K v. Gleissenthall, RG Kıcı, A Bakst, D Stefan, R Jhala
Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019
642019
Flexible dynamic information flow control in the presence of exceptions
D Stefan, D Mazières, JC Mitchell, A Russo
Journal of Functional Programming 27, e5, 2017
64*2017
Finding and preventing bugs in javascript bindings
F Brown, S Narayan, RS Wahby, D Engler, R Jhala, D Stefan
2017 IEEE Symposium on Security and Privacy (SP), 559-578, 2017
622017
The system can't perform the operation now. Try again later.
Articles 1–20