Follow
Deian Stefan
Title
Cited by
Year
{IODINE}: Verifying {Constant-Time} Execution of Hardware
K Gleissenthall, RG Kıcı, D Stefan, R Jhala
28th USENIX Security Symposium (USENIX Security 19), 1411-1428, 2019
332019
{SPAM}: a Secure Package Manager Unlike Your Current Package Managers
D Stefan
12017
{STORM}: Refinement types for secure web applications
N Lehmann, R Kunkel, J Brown, J Yang, N Vazou, N Polikarpova, ...
15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021
172021
2018 SecDev Program Committee
Y Acar, G Baah, N Bielova, IH Cai, S Chmielewski, H Duan, M Emmi, ...
3.5 WasmCert-Coq: A Mechanised Specification of WebAssembly
K Bhargavan, J Protzenko, A Rossberg, D Stefan
Foundations of WebAssembly, 7, 2023
2023
A Cryptographic Provenance Verification Approach For Host-Based Malware Detection
D Stefan, C Wu, DD Yao, G Xu
Rutgers University Technical Report, 2009
12009
A domain-specific language for computing on encrypted data
A Bain, J Mitchell, R Sharma, D Stefan, J Zimmerman
Cryptology ePrint Archive, 2011
252011
A hardware framework for the fast generation of multiple long-period random number streams
IL Dalal, D Stefan
Proceedings of the 16th international ACM/SIGDA symposium on Field …, 2008
352008
A library for removing cache-based attacks in concurrent information flow systems
P Buiras, A Levy, D Stefan, A Russo, D Mazieres
Trustworthy Global Computing: 8th International Symposium, TGC 2013, Buenos …, 2014
142014
A library for removing cache-based attacks in concurrent information flow systems: Extended version
P Buiras, A Levy, D Stefan, A Russo, D Mazieres
22013
A new software and hardware parallelized floating random-walk algorithm for the modified Helmholtz equation subject to Neumann and mixed boundary conditions
K Chatterjee, MC Sandora, C Mitchell, D Stefan, D Nummey, J Poggie
The Applied Computational Electromagnetics Society Journal (ACES), 373-380, 2010
32010
A Parallel Framework for Long-period Random Number Generators in Hardware
IL Dalal, D Stefan
2008
A parallelized quasi-monte carlo algorithm for the extraction of partial inductances in IC interconnect structures
D Stefana, I Dalalb, M Sandorac, CW Yua, S Srinivasand, N Chitrike, ...
Annual Review of Progress in Applied Computational Electromagnetics. ACES, 2010
2010
A Quasi-Monte Carlo Solver for Partial Inductances in IC Interconnect Structures
I Dalal, D Stefan, CW Yu, S Srinivasan, N Chitrik, M Sandora, J Salomon, ...
A Turning Point for Verified Spectre Sandboxing
S Cauligi, M Guarnieri, D Moghimi, D Stefan, M Vassena
arXiv preprint arXiv:2208.01548, 2022
2022
Addressing covert termination and timing channels in concurrent information flow systems
D Stefan, A Russo, P Buiras, A Levy, JC Mitchell, D Mazieres
ACM SIGPLAN Notices 47 (9), 201-214, 2012
842012
An Area-efficient Hardware Implementation of the CryptMT Stream Cipher
IL Dalal, D Stefan
feedback 128, 128, 0
Analysis and implementation of eSTREAM and SHA-3 cryptographic algorithms
D Stefan
Cooper Union for the Advancement of Science and Art, Albert Nerken School of …, 2011
102011
Auditing Rust Crates Effectively
D Thien, L Zoghbi, R Jhala, D Stefan, C Stanford
Automatically eliminating speculative leaks from cryptographic code with blade
M Vassena, C Disselkoen, K Gleissenthall, S Cauligi, RG Kıcı, R Jhala, ...
Proceedings of the ACM on Programming Languages 5 (POPL), 1-30, 2021
862021
The system can't perform the operation now. Try again later.
Articles 1–20