Follow
Amit Levy
Title
Cited by
Cited by
Year
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX security symposium 316, 10-5555, 2009
5742009
Hails: Protecting data privacy in untrusted web applications
D Giffin, A Levy, D Stefan, D Terei, D Mazieres, J Mitchell, A Russo
Journal of Computer Security 25 (4-5), 427-461, 2017
1952017
Multiprogramming a 64kb computer safely and efficiently
A Levy, B Campbell, B Ghena, DB Giffin, P Pannuto, P Dutta, P Levis
Proceedings of the 26th Symposium on Operating Systems Principles, 234-251, 2017
1762017
Comet: An Active Distributed {Key-Value} Store
R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
1202010
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Maziéres
Proceedings of the 17th ACM SIGPLAN international conference on Functional …, 2012
832012
Eliminating cache-based timing attacks with instruction-based scheduling
D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
822013
The case for writing a kernel in rust
A Levy, B Campbell, B Ghena, P Pannuto, P Dutta, P Levis
Proceedings of the 8th Asia-Pacific Workshop on Systems, 1-7, 2017
702017
Ownership is theft: Experiences building an embedded OS in Rust
A Levy, MP Andersen, B Campbell, D Culler, P Dutta, B Ghena, P Levis, ...
Proceedings of the 8th Workshop on Programming Languages and Operating …, 2015
702015
Beetle: Flexible communication for bluetooth low energy
AA Levy, J Hong, L Riliskis, P Levis, K Winstein
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
552016
Position paper: Progressive memory safety for webassembly
C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
432019
New directions for self-destructing data
R Geambasu, T Kohno, A Krishnamurthy, A Levy, HM Levy, P Gardner, ...
University of Washington, Tech. Rep. UW-CSE-11-08-01, 2011
28*2011
Stickler: Defending against malicious content distribution networks in an unmodified browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
25*2016
Don't talk unless i say so! securing the internet of things with default-off networking
J Hong, A Levy, L Riliskis, P Levis
2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018
232018
Blade: A data center garbage collector
D Terei, A Levy
arXiv preprint arXiv:1504.02578, 2015
172015
A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems
P Buiras, A Levy, D Stefan, A Russo, D Mazières
8th International Symposium on Trustworthy Global Computing (TGC 2013), 2013
16*2013
Building comprehensible access control for the Internet of Things using beetle
J Hong, A Levy, P Levis
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
112016
A networked embedded system platform for the post-mote era
P Pannuto, MP Andersen, T Bauer, B Campbell, A Levy, D Culler, P Levis, ...
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
82014
Doing more with less: orchestrating serverless applications without an orchestrator
DH Liu, A Levy, S Noghabi, S Burckhardt
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
72023
A Man of Contention: Martin Plessner (1900–1973) and His Encounters with the Orient
A Levy
Naharaim 10 (1), 79-100, 2016
72016
Building secure systems with LIO
D Stefan, A Levy, A Russo, D Mazières
ACM SIGPLAN Notices 49 (12), 93-94, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20