Flexible dynamic information flow control in the presence of exceptions

DEIAN STEFAN , DAVID MAZIÈRES , JOHN C. MITCHELL , ALEJANDRO RUSSO
Journal of Functional Programming 27

30
2017
MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code

JAY BOSAMIYA , AIDAN DENLINGER , CRAIG DISSELKOEN , BRYAN PARNO
Smpte Journal

2023
The road to less trusted code

TAL GARFINKEL , SHRAVAN NARAYAN , CRAIG DISSELKOEN , HOVAV SHACHAM
USENIX PATRONS 15 -15

2
2020
A parallelized quasi-monte carlo algorithm for the extraction of partial inductances in IC interconnect structures

D Stefana , I Dalalb , M Sandorac , CW Yua
Annual Review of Progress in Applied Computational Electromagnetics. ACES

2010
Hardware-Optimized Ziggurat Algorithm for High-Speed Gaussian Random Number Generators.

Hassan Edrees , Deian Stefan , McCullen Sandora , Brian Cheung
ERSA 254 -260

14
2009
The most dangerous code in the browser

Deian Stefan , Devon Rifkin , Alejandro Russo , Stefan Heule
hot topics in operating systems 23 -23

15
2015
Toward principled browser security

David Mazières , Petr Marchenko , John Mitchell , Deian Stefan
hot topics in operating systems 17 -17

11
2013
Protecting users by confining JavaScript with COWL

David Mazières , Petr Marchenko , Deian Stefan , Brad Karp
operating systems design and implementation 131 -146

111
2014
A Domain-Specific Language for Computing on Encrypted Data

Joe Zimmerman , John C. Mitchell , Deian Stefan , Rahul Sharma
IACR Cryptology ePrint Archive 2011 561

6
2011
Fast Implementations of AES on Various Platforms.

Dag Arne Osvik , Deian Stefan , Joppe W. Bos
IACR Cryptology ePrint Archive 2009 501

53
2009
A New Software and Hardware Parallelized Floating Random-Walk Algorithm for the Modified Helmholtz Equation Subject to Neumann and Mixed Boundary Conditions

Jonathan Poggie , Deian Stefan , Christopher Mitchell , Dave Nummey
Applied Computational Electromagnetics Society Journal 25 ( 4)

2
2010
Browser history re: visited.

Deian Stefan , Fraser Brown , Craig Disselkoen , Michael Smith
usenix security symposium

37
2018
{IODINE}: Verifying Constant-Time Execution of Hardware

Klaus von Gleissenthall , Ranjit Jhala , Deian Stefan , Rami Gökhan Kici
usenix security symposium 1411 -1428

5
2019
Retrofitting Fine Grain Isolation in the Firefox Renderer

Hovav Shacham , Tal Garfinkel , Deian Stefan , Sorin Lerner
usenix security symposium 699 -716

6
2020
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code

Deian Stefan , Dawson R. Engler , Fraser Brown
usenix security symposium 199 -216

32
2020
Automatically eliminating speculative leaks from cryptographic code with blade

Marco Vassena , Craig Disselkoen , Klaus von Gleissenthall , Sunjay Cauligi
symposium on principles of programming languages 5 1 -30

1
2021
CT-wasm: type-driven secure cryptography for the web ecosystem

Deian Stefan , John Renner , Sunjay Cauligi , Conrad Watt
Proceedings of the ACM on Programming Languages 3 77

18
2019
Доверя́й, но проверя́й: SFI safety for native-compiled Wasm

Deian Stefan , Stefan Savage , Sorin Lerner , Fraser Brown
network and distributed system security symposium

2021