Ariel J. Feldman
Ariel J. Feldman
Software Engineer, Google
Verified email at - Homepage
Cited by
Cited by
Lest We Remember: Cold-Boot Attacks on Encryption Keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
17th USENIX Security Symposium (Sec '08), 2008
SPORC: Group Collaboration using Untrusted Cloud Resources.
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX conference on Operating systems design and implementation (OSDI …, 2010
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) 13, 2007
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
24th ACM Symposium on Operating Systems Principles (SOSP '13), 341-357, 2013
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
Social networking with Frientegrity: privacy and integrity with an untrusted provider
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
21st USENIX Security Symposium (Sec '12), 2012
Source code review of the Diebold voting system
JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller
University of California, Berkeley under contract to the California …, 2007
Internet Filters: A Public Policy Report, Second Edition
M Heins, C Cho, A Feldman
Brennan Center for Justice at NYU School of Law, 2006
Verifiable differential privacy
A Narayan, A Feldman, A Papadimitriou, A Haeberlen
Proceedings of the Tenth European Conference on Computer Systems, 1-14, 2015
Using differential privacy to efficiently mitigate side channels in distributed analytics
M Xu, A Papadimitriou, A Feldman, A Haeberlen
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
B Dickens III, HS Gunawi, AJ Feldman, H Hoffmann
Proceedings of the Twenty-Third International Conference on Architectural …, 2018
On subliminal channels in encrypt-on-cast voting systems
AJ Feldman, J Benaloh
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
Hermetic: Privacy-preserving distributed analytics without (most) side channels
M Xu, A Papadimitriou, A Haeberlen, A Feldman
External Links: Link Cited by, 2019
Privacy and integrity in the untrusted cloud
AJ Feldman
Princeton University, 2012
Lemonade from lemons: Harnessing device wearout to create limited-use security architectures
Z Deng, A Feldman, SA Kurtz, FT Chong
ACM SIGARCH Computer Architecture News 45 (2), 361-374, 2017
Privacy and Integrity are Possible in the Untrusted Cloud
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
IEEE Data Eng. Bull. 35 (4), 73-82, 2012
Verifying computations with state (extended version)
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
Cryptology ePrint Archive, 2013
AVC Advantage: Hardware functional specifications
JA Halderman, AJ Feldman
Technical Report TR-816-08, Department of Computer Science, Princeton …, 2008
Internet Filters
M Heins, C Cho, A FELDMAN
A Public Policy Report, Free Expression Policy Project, National Coalition …, 2001
Integration of third-party encryption key managers with cloud services
IS Lee, SD Telang, JC Chau, TM Dierks, AJ Feldman, HJ Freyer, N Keidar, ...
US Patent 11,611,558, 2023
The system can't perform the operation now. Try again later.
Articles 1–20