Prime+Abort: A timer-free high-precision L3 cache attack using Intel TSX C Disselkoen, D Kohlbrenner, L Porter, D Tullsen 26th USENIX Security Symposium (USENIX Security 17), (Vancouver, BC), 51-67, 2017 | 242 | 2017 |
Constant-time foundations for the new Spectre era S Cauligi, C Disselkoen, K von Gleissenthall, DM Tullsen, D Stefan, ... PLDI 2020, 913-926, 2020 | 152 | 2020 |
Retrofitting Fine Grain Isolation in the Firefox Renderer S Narayan, C Disselkoen, T Garfinkel, N Froyd, E Rahm, S Lerner, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 110 | 2020 |
Automatically eliminating speculative leaks from cryptographic code with blade M Vassena, C Disselkoen, K Gleissenthall, S Cauligi, RG Kıcı, R Jhala, ... Proceedings of the ACM on Programming Languages 5 (POPL), 1-30, 2021 | 103 | 2021 |
Swivel: Hardening {WebAssembly} against spectre S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, ... 30th USENIX Security Symposium (USENIX Security 21), 1433-1450, 2021 | 83 | 2021 |
SoK: Practical foundations for software Spectre defenses S Cauligi, C Disselkoen, D Moghimi, G Barthe, D Stefan 2022 IEEE Symposium on Security and Privacy (SP), 666-680, 2022 | 65 | 2022 |
Position paper: Progressive memory safety for WebAssembly C Disselkoen, J Renner, C Watt, T Garfinkel, A Levy, D Stefan 8th International Workshop on Hardware and Architectural Support for …, 2019 | 54 | 2019 |
Browser history {re: visited} M Smith, C Disselkoen, S Narayan, F Brown, D Stefan 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 47 | 2018 |
A genome-wide association study of red-blood cell fatty acids and ratios incorporating dietary covariates: Framingham Heart Study Offspring Cohort A Kalsbeek, J Veenstra, J Westra, C Disselkoen, K Koch, KA McKenzie, ... PloS one 13 (4), e0194882, 2018 | 36 | 2018 |
The code that never ran: Modeling attacks on speculative evaluation C Disselkoen, R Jagadeesan, A Jeffrey, J Riely 2019 IEEE Symposium on Security and Privacy (SP), 1238-1255, 2019 | 35 | 2019 |
Mswasm: Soundly enforcing memory-safe execution of unsafe code AE Michael, A Gollamudi, J Bosamiya, E Johnson, A Denlinger, ... Proceedings of the ACM on Programming Languages 7 (POPL), 425-454, 2023 | 29 | 2023 |
Finding and eliminating timing side-channels in crypto code with pitchfork C Disselkoen, S Cauligi, D Tullsen, D Stefan TECHCON, 2020 | 7 | 2020 |
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization JW Cutler, C Disselkoen, A Eline, S He, K Headley, M Hicks, K Hietala, ... Proceedings of the ACM on Programming Languages 8 (OOPSLA1), 670-697, 2024 | 5 | 2024 |
Retrofitting fine grain isolation in the firefox renderer (extended version) S Narayan, C Disselkoen, T Garfinkel, N Froyd, E Rahm, S Lerner, ... arXiv preprint arXiv:2003.00572, 2020 | 5 | 2020 |
A Bayesian framework for the classification of microbial gene activity states C Disselkoen, B Greco, K Cook, K Koch, R Lerebours, C Viss, J Cape, ... Frontiers in Microbiology 7, 1191, 2016 | 4 | 2016 |
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version) JW Cutler, C Disselkoen, A Eline, S He, K Headley, M Hicks, K Hietala, ... arXiv preprint arXiv:2403.04651, 2024 | 2 | 2024 |
Tutorial: Sandboxing (unsafe) C code with RLBox S Narayan, C Disselkoen, D Stefan 2021 IEEE Secure Development Conference (SecDev), 11-12, 2021 | 2 | 2021 |
The road to less trusted code TAL GARFINKEL, S NARAYAN, C DISSELKOEN, H SHACHAM, ... USENIX PATRONS, 15, 2020 | 2 | 2020 |
How we built Cedar: A verification-guided approach C Disselkoen, A Eline, S He, K Headley, M Hicks, K Hietala, J Kastner, ... Companion Proceedings of the 32nd ACM International Conference on the …, 2024 | 1 | 2024 |
Improved performance of gene set analysis on genome-wide transcriptomics data when using gene activity state estimates T Kamp, M Adams, C Disselkoen, N Tintle Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing 22, 449, 2016 | 1 | 2016 |