Ariel J. Feldman
Ariel J. Feldman
Assistant Professor of Computer Science, University of Chicago
Verified email at cs.uchicago.edu - Homepage
TitleCited byYear
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
13252009
SPORC: Group Collaboration using Untrusted Cloud Resources.
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX conference on Operating systems design and implementation (OSDI…, 2010
2972010
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) 13, 2007
2212007
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
24th ACM Symposium on Operating Systems Principles (SOSP '13), 341-357, 2013
1312013
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE…, 2009
1142009
Social networking with Frientegrity: privacy and integrity with an untrusted provider
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
21st USENIX Security Symposium (Sec '12) 12, 2012
722012
The data on diversity
B Nelson
Communications of the ACM 57 (11), 86-95, 2014
602014
Source code review of the Diebold voting system
JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller
University of California, Berkeley under contract to the California…, 2007
542007
Internet Filters: A Public Policy Report, Second Edition
M Heins, C Cho, A Feldman
Brennan Center for Justice at NYU School of Law, 2006
48*2006
Verifiable differential privacy
A Narayan, A Feldman, A Papadimitriou, A Haeberlen
Proceedings of the Tenth European Conference on Computer Systems, 1-14, 2015
152015
On subliminal channels in encrypt-on-cast voting systems
AJ Feldman, J Benaloh
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE…, 2009
132009
Privacy and integrity in the untrusted cloud
AJ Feldman
PRINCETON UNIV NJ, 2012
82012
Privacy and Integrity are Possible in the Untrusted Cloud.
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
IEEE Data Eng. Bull. 35 (4), 73-82, 2012
72012
AVC Advantage: Hardware functional specifications
JA Halderman, AJ Feldman
Technical Report TR-816-08, Department of Computer Science, Princeton…, 2008
52008
Using differential privacy to efficiently mitigate side channels in distributed analytics
M Xu, A Papadimitriou, A Feldman, A Haeberlen
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
42018
Lemonade from lemons: Harnessing device wearout to create limited-use security architectures
Z Deng, A Feldman, SA Kurtz, FT Chong
ACM SIGARCH Computer Architecture News 45 (2), 361-374, 2017
42017
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
B Dickens III, HS Gunawi, AJ Feldman, H Hoffmann
Proceedings of the Twenty-Third International Conference on Architectural…, 2018
32018
Verifying computations with state (extended version)
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
Cryptology ePrint Archive, Report 2013/356, 2013
12013
Hermetic: Privacy-preserving distributed analytics without (most) side channels
M Xu, A Papadimitriou, A Haeberlen, A Feldman
External Links: Link Cited by: I, VII, 0
1
Stream Ciphers for Digital Storage Encryption
B Dickens III, H Gunawi, A Feldman, H Hoffmann
US Patent App. 16/264,991, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20