Follow
Manuel Costa
Manuel Costa
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Vigilante: End-to-end containment of internet worms
M Costa, J Crowcroft, M Castro, A Rowstron, L Zhou, L Zhang, P Barham
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
9942005
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE symposium on security and privacy, 38-54, 2015
8632015
Oblivious {Multi-Party} machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016
6802016
Securing software by enforcing data-flow integrity.
M Castro, M Costa, T Harris
OSDI 6, 147-160, 2006
5432006
PIC: Practical Internet coordinates for distance estimation
M Costa, M Castro, R Rowstron, P Key
24th International Conference on Distributed Computing Systems, 2004 …, 2004
4632004
Preventing memory error exploits with WIT
P Akritidis, C Cadar, C Raiciu, M Costa, M Castro
2008 IEEE Symposium on Security and Privacy (sp 2008), 263-277, 2008
4512008
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.
P Akritidis, M Costa, M Castro, S Hand
USENIX Security Symposium 10, 96, 2009
4062009
EnclaveDB: A secure database using SGX
C Priebe, K Vaswani, M Costa
2018 IEEE Symposium on Security and Privacy (SP), 264-278, 2018
4042018
Containment of worms
M Costa, M Castro, A Rowstron, J Crowcroft
US Patent 7,603,715, 2009
3872009
Strong and efficient cache {Side-Channel} protection using hardware transactional memory
D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa
26th USENIX Security Symposium (USENIX Security 17), 217-233, 2017
3322017
Fast byte-granularity software fault isolation
M Castro, M Costa, JP Martin, M Peinado, P Akritidis, A Donnelly, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2702009
Performance and dependability of structured peer-to-peer overlays
M Castro, M Costa, A Rowstron
International Conference on Dependable Systems and Networks, 2004, 9-18, 2004
2452004
Bouncer: Securing software by blocking bad input
M Costa, M Castro, L Zhou, L Zhang, M Peinado
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
2172007
A first look at peer-to-peer worms: Threats and defenses
L Zhou, L Zhang, F McSherry, N Immorlica, M Costa, S Chien
International Workshop on Peer-to-Peer Systems, 24-35, 2005
2122005
Debunking some myths about structured and unstructured overlays
M Castro, M Costa, A Rowstron
Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005
2102005
Should we build Gnutella on a structured overlay?
M Castro, M Costa, A Rowstron
ACM SIGCOMM Computer Communication Review 34 (1), 131-136, 2004
1622004
Better bug reporting with better privacy
M Castro, M Costa, JP Martin
ACM SIGOPS Operating Systems Review 42 (2), 319-328, 2008
1532008
Broom: Sweeping out garbage collection from big data systems
I Gog, J Giceva, M Schwarzkopf, K Vaswani, D Vytiniotis, G Ramalingam, ...
15th Workshop on Hot Topics in Operating Systems (HotOS XV), 2015
1302015
Data randomization
C Cadar, P Akritidis, M Costa, JP Martin, M Castro
Technical Report TR-2008-120, Microsoft Research, 2008. Cited on, 2008
1262008
Observing and preventing leakage in MapReduce
O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1092015
The system can't perform the operation now. Try again later.
Articles 1–20