Остановите войну!
for scientists:
default search action
Nickolai Zeldovich
- > Home > Persons > Nickolai Zeldovich
Publications
- 2023
- [c87]Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich, Joseph Tassarotti:
The K2 Architecture for Trustworthy Hardware Security Modules. KISV@SOSP 2023: 26-32 - [c86]Yun-Sheng Chang, Ralf Jung, Upamanyu Sharma, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying vMVCC, a high-performance transaction library using multi-version concurrency control. OSDI 2023: 871-886 - [c85]Upamanyu Sharma, Ralf Jung, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Grove: a Separation-Logic Library for Verifying Distributed Systems. SOSP 2023: 113-129 - [i15]Upamanyu Sharma, Ralf Jung, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Grove: a Separation-Logic Library for Verifying Distributed Systems (Extended Version). CoRR abs/2309.03046 (2023) - 2022
- [c83]Tej Chajed, Joseph Tassarotti, Mark Theng, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning. OSDI 2022: 447-463 - [c82]Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying Hardware Security Modules with Information-Preserving Refinement. OSDI 2022: 503-519 - 2021
- [c79]Tej Chajed, Joseph Tassarotti, Mark Theng, Ralf Jung, M. Frans Kaashoek, Nickolai Zeldovich:
GoJournal: a verified, concurrent, crash-safe journaling system. OSDI 2021: 423-439 - 2020
- [j13]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. GetMobile Mob. Comput. Commun. 24(2): 34-38 (2020) - [j12]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. login Usenix Mag. 45(1) (2020) - [c77]Jonathan Behrens, Anton Cao, Cel Skeggs, Adam Belay, M. Frans Kaashoek, Nickolai Zeldovich:
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract. OSDI 2020: 1139-1154 - 2019
- [c75]Eleftherios Ioannidis, M. Frans Kaashoek, Nickolai Zeldovich:
Extracting and Optimizing Formally Verified Code for Systems Programming. NFM 2019: 228-236 - [c74]Tej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Argosy: verifying layered storage systems with recovery refinement. PLDI 2019: 1054-1068 - [c73]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: a device for secure transaction approval. SOSP 2019: 97-113 - [c71]Tej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying concurrent, crash-safe systems with Perennial. SOSP 2019: 243-258 - 2018
- [c69]Tej Chajed, M. Frans Kaashoek, Butler W. Lampson, Nickolai Zeldovich:
Verifying concurrent software using movers in CSPEC. OSDI 2018: 306-322 - [c68]Atalay Mert Ileri, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Proving confidentiality in a file system using DiskSec. OSDI 2018: 323-338 - [i11]Lillian Tsai, Eddie Kohler, M. Frans Kaashoek, Nickolai Zeldovich:
A Revised and Verified Proof of the Scalable Commutativity Rule. CoRR abs/1809.09550 (2018) - 2017
- [j11]Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler:
Certifying a file system using crash hoare logic: correctness in the presence of crashes. Commun. ACM 60(4): 75-84 (2017) - [j10]Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert Tappan Morris, Nickolai Zeldovich:
The scalable commutativity rule: designing scalable software for multicore processors. Commun. ACM 60(8): 83-90 (2017) - [c65]Srivatsa S. Bhat, Rasha Eqbal, Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
Scaling a file system to many cores using an operation log. SOSP 2017: 69-86 - [c64]Haogang Chen, Tej Chajed, Alex Konradi, Stephanie Wang, Atalay Mert Ileri, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Verifying a high-performance crash-safe file system using a tree specification. SOSP 2017: 270-286 - 2016
- [j9]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A differential approach to undefined behavior detection. Commun. ACM 59(3): 99-106 (2016) - [c60]Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare Logic for Certifying the FSCQ File System. USENIX Annual Technical Conference 2016 - [i7]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building web applications on top of encrypted data using Mylar. IACR Cryptol. ePrint Arch. 2016: 893 (2016) - 2015
- [j8]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich, Robert Tappan Morris, Eddie Kohler:
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors. ACM Trans. Comput. Syst. 32(4): 10:1-10:47 (2015) - [j7]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A Differential Approach to Undefined Behavior Detection. ACM Trans. Comput. Syst. 33(1): 1:1-1:29 (2015) - [c59]Charles Gruenwald III, Filippo Sironi, M. Frans Kaashoek, Nickolai Zeldovich:
Hare: a file system for non-cache-coherent multicores. EuroSys 2015: 30:1-30:16 - [c58]Tej Chajed, Jon Gjengset, Jelle van den Hooff, M. Frans Kaashoek, James Mickens, Robert Tappan Morris, Nickolai Zeldovich:
Amber: Decoupling User Data from Web Applications. HotOS 2015 - [c57]Haogang Chen, Daniel Ziegler, Adam Chlipala, M. Frans Kaashoek, Eddie Kohler, Nickolai Zeldovich:
Specifying Crash Safety for Storage Systems. HotOS 2015 - [c56]Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare logic for certifying the FSCQ file system. SOSP 2015: 18-37 - 2014
- [j5]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. login Usenix Mag. 39(4) (2014) - [c53]Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich:
VerSum: Verifiable Computations over Large Public Logs. CCS 2014: 1304-1316 - [c50]Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Identifying Information Disclosure in Web Applications with Retroactive Auditing. OSDI 2014: 555-569 - 2013
- [j4]Stephen Tu, M. Frans Kaashoek, Samuel Madden, Nickolai Zeldovich:
Processing Analytical Queries over Encrypted Data. Proc. VLDB Endow. 6(5): 289-300 (2013) - [c47]Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Security bugs in embedded interpreters. APSys 2013: 17:1-17:7 - [c43]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
RadixVM: scalable address spaces for multithreaded applications. EuroSys 2013: 211-224 - [c41]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich, Robert Tappan Morris, Eddie Kohler:
The scalable commutativity rule: designing scalable software for multicore processors. SOSP 2013: 1-17 - [c39]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
Towards optimization-safe systems: analyzing the impact of undefined behavior. SOSP 2013: 260-275 - 2012
- [c35]Xi Wang, Haogang Chen, Alvin Cheung, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Undefined behavior: what happened to my code? APSys 2012: 9 - [c33]Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich:
Scalable address spaces using RCU balanced trees. ASPLOS 2012: 199-210 - [c31]Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Improving Integer Security for Systems with KINT. OSDI 2012: 163-177 - [c29]Zviad Metreveli, Nickolai Zeldovich, M. Frans Kaashoek:
CPHASH: a cache-partitioned hash table. PPoPP 2012: 319-320 - 2011
- [c28]Haogang Chen, Yandong Mao, Xi Wang, Dong Zhou, Nickolai Zeldovich, M. Frans Kaashoek:
Linux kernel vulnerabilities: state-of-the-art defenses and open problems. APSys 2011: 5 - [c27]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Retroactive auditing. APSys 2011: 9 - [c21]Yandong Mao, Haogang Chen, Dong Zhou, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Software fault isolation with API integrity and multi-principal modules. SOSP 2011: 115-128 - 2010
- [c17]Silas Boyd-Wickizer, Austin T. Clements, Yandong Mao, Aleksey Pesterev, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
An Analysis of Linux Scalability to Many Cores. OSDI 2010: 1-16 - [c16]Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Intrusion Recovery Using Selective Re-execution. OSDI 2010: 89-104 - 2009
- [c10]Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Improving application security with data flow assertions. SOSP 2009: 291-304 - 2003
- [c2]Nickolai Zeldovich, Alexander Yip, Frank Dabek, Robert Tappan Morris, David Mazières, M. Frans Kaashoek:
Multiprocessor Support for Event-Driven Programs. USENIX Annual Technical Conference, General Track 2003: 239-252 - 2002
- [c1]Frank Dabek, Nickolai Zeldovich, M. Frans Kaashoek, David Mazières, Robert Tappan Morris:
Event-driven programming for robust software. ACM SIGOPS European Workshop 2002: 186-189
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint