default search action
Michael Walfish
Person information
- affiliation: New York University, Courant Institute of Mathematical Sciences, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Ioanna Tzialla, Jeffery Wang, Jingyi Zhu, Aurojit Panda, Michael Walfish:
Efficient Auditing of Event-driven Web Applications. EuroSys 2024: 1208-1224 - [c40]Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish:
Zombie: Middleboxes that Don't Snoop. NSDI 2024 - 2023
- [c39]Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies:
Less is more: refinement proofs for probabilistic proofs. SP 2023: 1112-1129 - [i18]Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish:
Zombie: Middleboxes that Don't Snoop. IACR Cryptol. ePrint Arch. 2023: 1022 (2023) - 2022
- [c38]Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish:
Zero-Knowledge Middleboxes. USENIX Security Symposium 2022: 4255-4272 - [i17]Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies:
Less is more: refinement proofs for probabilistic proofs. IACR Cryptol. ePrint Arch. 2022: 1557 (2022) - 2021
- [i16]Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish:
Zero-Knowledge Middleboxes. IACR Cryptol. ePrint Arch. 2021: 1022 (2021) - 2020
- [c37]Cheng Tan, Changgeng Zhao, Shuai Mu, Michael Walfish:
Cobra: Making Transactional Key-Value Stores Verifiably Serializable. OSDI 2020: 63-80
2010 – 2019
- 2019
- [i15]Cheng Tan, Changgeng Zhao, Shuai Mu, Michael Walfish:
Detecting Incorrect Behavior of Cloud Databases as an Outsider. CoRR abs/1912.09018 (2019) - 2018
- [c36]Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-Efficient zkSNARKs Without Trusted Setup. IEEE Symposium on Security and Privacy 2018: 926-943 - 2017
- [c35]Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full Accounting for Verifiable Outsourcing. CCS 2017: 2071-2086 - [c34]Trinabh Gupta, Henrique Fingler, Lorenzo Alvisi, Michael Walfish:
Pretzel: Email encryption and provider-supplied functions are compatible. SIGCOMM 2017: 169-182 - [c33]Cheng Tan, Lingfan Yu, Joshua B. Leners, Michael Walfish:
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web. SOSP 2017: 546-564 - [e1]Sujata Banerjee, Brad Karp, Michael Walfish:
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, HotNets 2017, November 30 - December 01, 2017. ACM 2017, ISBN 978-1-4503-5569-8 [contents] - [i14]Cheng Tan, Lingfan Yu, Joshua B. Leners, Michael Walfish:
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web. CoRR abs/1709.08501 (2017) - [i13]Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full accounting for verifiable outsourcing. IACR Cryptol. ePrint Arch. 2017: 242 (2017) - [i12]Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-efficient zkSNARKs without trusted setup. IACR Cryptol. ePrint Arch. 2017: 1132 (2017) - 2016
- [c32]Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish:
Scalable and Private Media Consumption with Popcorn. NSDI 2016: 91-107 - [c31]Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. IEEE Symposium on Security and Privacy 2016: 759-778 - [c30]Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish:
Defending against Malicious Peripherals with Cinch. USENIX Security Symposium 2016: 397-414 - [i11]Trinabh Gupta, Henrique Fingler, Lorenzo Alvisi, Michael Walfish:
Pretzel: Email encryption and provider-supplied functions are compatible. CoRR abs/1612.04265 (2016) - 2015
- [j4]Michael Walfish, Andrew J. Blumberg:
Verifying computations without reexecuting them. Commun. ACM 58(2): 74-84 (2015) - [c29]Joshua B. Leners, Trinabh Gupta, Marcos K. Aguilera, Michael Walfish:
Taming uncertainty in distributed systems with help from the network. EuroSys 2015: 9:1-9:16 - [c28]Marcos K. Aguilera, Joshua B. Leners, Ramakrishna Kotla, Michael Walfish:
Yesquel: Scalable SQL storage for Web applications. ICDCN 2015: 40:1-40:4 - [c27]Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish:
Efficient RAM and control flow in verifiable outsourced computation. NDSS 2015 - [c26]Marcos K. Aguilera, Joshua B. Leners, Michael Walfish:
Yesquel: scalable sql storage for web applications. SOSP 2015: 245-262 - [i10]Riad S. Wahby, Sebastian Angel, Max Howald, Joshua B. Leners, Andrew J. Blumberg, Michael Walfish:
Harmful devices considered harmless. CoRR abs/1506.01449 (2015) - [i9]Trinabh Gupta, Natacha Crooks, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish:
Scalable and private media consumption with Popcorn. IACR Cryptol. ePrint Arch. 2015: 489 (2015) - [i8]Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. IACR Cryptol. ePrint Arch. 2015: 1243 (2015) - 2014
- [j3]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
A brief overview of the NEBULA future internet architecture. Comput. Commun. Rev. 44(3): 81-86 (2014) - [i7]Marcos K. Aguilera, Joshua B. Leners, Ramakrishna Kotla, Michael Walfish:
Yesquel: scalable SQL storage for Web applications. CoRR abs/1411.2160 (2014) - [i6]Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish:
Efficient RAM and control flow in verifiable outsourced computation. IACR Cryptol. ePrint Arch. 2014: 674 (2014) - [i5]Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish:
Verifiable computation using multiple provers. IACR Cryptol. ePrint Arch. 2014: 846 (2014) - 2013
- [c25]Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish:
Resolving the conflict between generality and plausibility in verified computation. EuroSys 2013: 71-84 - [c24]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
The NEBULA Future Internet Architecture. Future Internet Assembly 2013: 16-26 - [c23]Michael Walfish:
Verifying the correctness of remote executions: from wild implausibility to near practicality. HotDep 2013: 7:1 - [c22]Trinabh Gupta, Joshua B. Leners, Marcos K. Aguilera, Michael Walfish:
Improving Availability in Distributed Systems with Failure Informers. NSDI 2013: 427-441 - [c21]Sebastian Angel, Michael Walfish:
Verifiable auctions for online ad exchanges. SIGCOMM 2013: 195-206 - [c20]Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish:
Verifying computations with state. SOSP 2013: 341-357 - [c19]Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish:
A Hybrid Architecture for Interactive Verifiable Computation. IEEE Symposium on Security and Privacy 2013: 223-237 - [i4]Michael Walfish, Andrew J. Blumberg:
Verifying computations without reexecuting them: from theoretical possibility to near-practicality. Electron. Colloquium Comput. Complex. TR13 (2013) - [i3]Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish:
Verifying computations with state. IACR Cryptol. ePrint Arch. 2013: 356 (2013) - 2012
- [c18]Srinath T. V. Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish:
Making argument systems for outsourced computation practical (sometimes). NDSS 2012 - [c17]Lon Ingram, Michael Walfish:
Treehouse: Javascript Sandboxes to Help Web Developers Help Themselves. USENIX ATC 2012: 153-164 - [c16]Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish:
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality. USENIX Security Symposium 2012: 253-268 - [i2]Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish:
Taking proof-based verified computation a few steps closer to practicality (extended version). IACR Cryptol. ePrint Arch. 2012: 598 (2012) - [i1]Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish:
Resolving the conflict between generality and plausibility in verified computation. IACR Cryptol. ePrint Arch. 2012: 622 (2012) - 2011
- [j2]Prince Mahajan, Srinath T. V. Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Michael Dahlin, Michael Walfish:
Depot: Cloud Storage with Minimal Trust. ACM Trans. Comput. Syst. 29(4): 12:1-12:38 (2011) - [c15]Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, Arun Seehra:
Verifying and enforcing network paths with icing. CoNEXT 2011: 30 - [c14]John R. Douceur, Jon Howell, Bryan Parno, Michael Walfish, Xi Xiong:
The web interface should be radically refactored. HotNets 2011: 10 - [c13]Lon Ingram, Ivaylo Popov, Srinath T. V. Setty, Michael Walfish:
Repair from a Chair: Computer Repair as an Untrusted Cloud Service. HotOS 2011 - [c12]Joshua B. Leners, Hao Wu, Wei-Lun Hung, Marcos Kawazoe Aguilera, Michael Walfish:
Detecting failures in distributed systems with the Falcon spy network. SOSP 2011: 279-294 - 2010
- [j1]Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker:
DDoS defense by offense. ACM Trans. Comput. Syst. 28(1): 3:1-3:54 (2010) - [c11]Prince Mahajan, Srinath T. V. Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Michael Dahlin, Michael Walfish:
Depot: Cloud Storage with Minimal Trust. OSDI 2010: 307-322
2000 – 2009
- 2009
- [c10]Arun Seehra, Jad Naous, Michael Walfish, David Mazières, Antonio Nicolosi, Scott Shenker:
A Policy Framework for the Future Internet. HotNets 2009 - [c9]Marcos Kawazoe Aguilera, Michael Walfish:
No Time for Asynchrony. HotOS 2009 - 2007
- [b1]Michael Walfish:
Defending networked resources against floods of unwelcome requests. Massachusetts Institute of Technology, Cambridge, MA, USA, 2007 - [c8]Micah Z. Brodsky, Maxwell N. Krohn, Robert Tappan Morris, Michael Walfish, Alexander Yip:
World Wide Web Without Walls. HotNets 2007 - 2006
- [c7]Michael Walfish, J. D. Zamfirescu, Hari Balakrishnan, David R. Karger, Scott Shenker:
Distributed Quota Enforcement for Spam Control. NSDI 2006 - [c6]Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker:
DDoS defense by offense. SIGCOMM 2006: 303-314 - 2005
- [c5]Hari Balakrishnan, Scott Shenker, Michael Walfish:
Peering Peer-to-Peer Providers. IPTPS 2005: 104-114 - 2004
- [c4]Michael Walfish, Hari Balakrishnan:
Untangling the Web from DNS. NSDI 2004: 225-238 - [c3]Michael Walfish, Jeremy Stribling, Maxwell N. Krohn, Hari Balakrishnan, Robert Tappan Morris, Scott Shenker:
Middleboxes No Longer Considered Harmful. OSDI 2004: 215-230 - [c2]Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish:
A layered naming architecture for the internet. SIGCOMM 2004: 343-352 - 2003
- [c1]Hari Balakrishnan, Scott Shenker, Michael Walfish:
Semantic-Free Referencing in Linked Distributed Systems. IPTPS 2003: 197-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint