/
David Mazi eres Associate Professor of Computer Science Stanford University    Serra Mall David Mazi eres Associate Professor of Computer Science Stanford University    Serra Mall

David Mazi eres Associate Professor of Computer Science Stanford University Serra Mall - PDF document

jane-oiler
jane-oiler . @jane-oiler
Follow
638 views
Uploaded On 2014-11-30

David Mazi eres Associate Professor of Computer Science Stanford University Serra Mall - PPT Presentation

scsstanfordedu dm Stanford CA 94305 Education Massachusetts Institute of Technology Cambridge MA PhD in Electrical Engineering and Computer Science September 2000 Thesis title Selfcertifying F ID: 18909

scsstanfordedu Stanford 94305

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "David Mazi eres Associate Professor of C..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

DavidMazièresProfessorofComputerScienceStanfordUniversity(415)490-9451353SerraMall,Room290http://www.scs.stanford.edu/~dm/Stanford,CA94305EducationMassachusettsInstituteofTechnology..............................Cambridge,MAPh.D.inElectricalEngineeringandComputerScience................September,2000Thesistitle:Self-certifyingFileSystem.Advisor:Prof.M.FransKaashoek.S.M.inElectricalEngineeringandComputerScience.................September,1997Thesistitle:SecurityandDecentralizedControlintheSFSGlobalFileSystem.HarvardUniversity..................................................Cambridge,MAA.B.withhonorsinComputerScience......................................June,1994Thesistitle:AbstractExecutioninaMulti-TaskingEnvironment.InterestsComputersystems,especiallyoperatingsystems,security,andprivacy.TeachingCryptocurrenciesandBlockchainTechnologies(CS251).Anintroductiontoblockchains,consensus,scalabilitytechniques,smartcontracts,andapplications.OperatingSystems(CS140).Anintroductiontooperatingsystems,withrigorousprogrammingassignments.DistributedSystems(CS244b).Coverstheprinciplesofdistributedsystems,includingreplication,consistency,Byzantinefaulttolerance,scalability,naming,andmanyexam-plesofsystemsaddressingthesechallenges.Includesoneortwoshortprogrammingassignmentsfollowedbyasmallresearchprojectdoneinteams.FunctionalSystemsinHaskell(CS240h).Coversanarrayofpracticalissuesandtechniquesthatarisewhenbuildingreal-worldsystemsintheHaskellprogramminglanguage.AdvancedTopicsinOperatingSystems(CS240).Surveyofclassicandnewpapersonoperatingsystemstopics,coveringvirtualmemory,synchronization,virtualmachines,lesystems,scalability,kernelarchitectures,reliability,andsecurity.ComputerNetworking(CS144).Anintroductiontocomputernetworking,withpro-grammingassignmentsinC.ComputerandNetworkSecurity(CS155).Coversprinciplesofcomputersystemsse-curity,includingattacktechniquesandhowtodefendagainstthem,withprogrammingassignments.DistributedStorageSystems(CS240d).AdetailedexaminationofanumberoftopicsincludingRPCprogramming,disklayout,transactions,andreconciliationinweaklyconsistentsystems.1 AdvancedOperatingSystemsImplementation(CS240c).Coversthedesignandim-plementationofoperatingsystems.NYUClassesComputerNetworks(undergraduatecourse).HonorsOperatingSystems(graduatecourse).ComputerSystemSecurity(graduatecourse).Positions2/15presentProfessor.StanfordUniversity,Stanford,CA.7/14presentCo-founder,ChiefScientist.StellarDevelopmentFoundation,SanFrancisco,CA.7/148/19Co-founder.Intrinsic,SanFrancisco,CA.9/071/15AssociateProfessor.StanfordUniversity,Stanford,CA.10/0812/08ProfessorialResearchAssociate.UniversityCollegeLondon,London,UK.9/058/07AssistantProfessor.StanfordUniversity,Stanford,CA.9/058/07AssociateProfessor(onleave).NewYorkUniversity,NewYork,NY.9/008/05AssistantProfessor.NewYorkUniversity,NewYork,NY.6/998/99SummerIntern.BellLabs,MurrayHill,NJ.6/958/95SummerIntern.DECWesternResearchLaboratory,PaloAlto,CA.6/945/95OperatingSystemsProgrammer.HarvardUniversity,Cambridge,MA.6/938/93OperatingSystemsSummerIntern.KendallSquareResearch,Waltham,MA.2/915/95Late-nightRockDJ.WHRB-FM,Cambridge,MA.Ph.D.StudentsAmitLevy.Thesis:AsecureoperatingsystemfortheInternetofthings,2018.AliJoséMashtizadeh.Thesis:TopicsinSystemsReliability:Storage,Execution,andSecurity,2017.EdwardZ.Yang.Thesis:Backpack:TowardsPracticalMix-inLinkinginHaskell,2017.DavidTerei.Thesis:Control,Performance,andSafetyinProgrammingLanguages,2016.AdamBelay.Thesis:UnleashingHardwarePotentialThroughBetterOperatingSystemAbstractions,2016.DeianStefan.Thesis:PrincipledandPracticalWebApplicationSecurity,2015.VimalkumarJeyakumar.Thesis:MillionsofLittleMinions:UsingPacketsforLowLatencyNetworkProgrammingandVisibility,2014.SteveRumble.Thesis:MemoryAndObjectManagementInRamcloud,2014.JadNaous.Thesis:Path-policycompliantnetworkingandaplatformforheterogeneousIaaSmanagemenent,2011.NickolaiZeldovich.Thesis:SecuringUntrustworthySoftwareUsingInformationFlowControl,2007.AntonioNicolosi.Thesis:AuthenticationMechanismsforOpenDistributedSystems,2007.2 MichaelJ.Freedman.Thesis:DemocratizingContentDistribution,2007.SiddharthaAnnapureddy.Thesis:ScalingDataServersviaCooperativeCaching,2007.JinyuanLi.Thesis:BuildingTrustworthyStorageServicesoutofUntrustedInfrastructure,2006.MichaelKaminsky.Thesis:UserAuthenticationandRemoteExecutionAcrossAdministrativeDomains,2004.MarcWaldman.Thesis:SecureandRobustCensorship-ResistantPublishingSystems,2003.AwardsDistinguishedpaper,Oakland2015[11].AlfredP.SloanResearchFellow,2002.Bestpaperaward,USENIX2001[46].NSFCareeraward,2001.MITGeorgeR.Sprowlsawardforbestthesisincomputerscience,2000.ProfessionalactivitiesProgramCommittees:Oakland2016,HotOS2015,ICFP2014,HaskellSymposium2013,ASPLOS2013,NSDI2011,SIGCOMM2009,SOSP2007.DARPAISAT20102013.Co-chair,workshoponFosteringadoptionofprogramminglanguages,February2013.Refereedjournalpublications(Mystudentsarelistedinboldface.)[1]DeianStefan,DavidMazières,JohnC.Mitchell,andAlejandroRusso.Flexibledynamicinformationowcontrolinthepresenceofexceptions.JournalofFunctionalProgramming,2017.AversionappearedinProceedingsofthe4thSymposiumonHaskell,2011.Aversionofthispaperappearedasrefereedconferencepaper[26].[2]SteveVanDeBogart,PetrosEfstathopoulos,EddieKohler,MaxwellKrohn,CliFrey,DavidZiegler,FransKaashoek,RobertMorris,andDavidMazières.LabelsandeventprocessesintheAsbestosoperatingsystem.ACMTransactionsonComputerSystems,25(4):11:143,December2007.Aversionofthispaperappearedasrefereedconferencepaper[34].[3]KevinFu,M.FransKaashoek,andDavidMazières.Fastandsecuredistributedread-onlylesystem.ACMTransactionsonComputerSystems,20(1):124,February2002.Aversionofthispaperappearedasrefereedconferencepaper[47].[4]J.BradleyChen,YasuhiroEndo,KeeChan,DavidMazières,AntonioDias,MargoSeltzer,andMikeSmith.Themeasuredperformanceofpersonalcomputeroperatingsystems.ACMTransactionsonComputerSystems,14(1):340,February1996.Aversionofthispaperappearedasrefereedconferencepaper[51].RefereedconferencepublicationsConferences:3 [5]MartaLokhava,GiulianoLosa,DavidMazières,GraydonHoare,NicolasBarry,EliGafni,RafaªMalinowsky,andJedMcCaleb.FastandsecureglobalpaymentswithStellar.InProceedingsofthe27thACMSymposiumonOperatingSystemsPrinciples,Huntsville,Ontario,October2019.[6]GiulianoLosa,EliGafni,andDavidMazières.Stellarconsensusbyinstantiation.InProceedingsofthe33rdInternationalSymposiumonDistributedComputing(DISC),Budapest,Hungary,October2019.[7]EmmaDauterman,HenryCorrigan-Gibbs,DavidMazières,DanBoneh,andDominicRizzo.True2f:Backdoor-resistantauthenticationtokens.InProceedingsofthe2019IEEESymposiumonSecurityandPrivacy,May2019.[8]KostisKaes,TimothyChong,JackTigarHumphries,AdamBelay,DavidMazières,andChristosKozyrakis.Shinjuku:Preemptiveschedulingforsecond-scaletaillatency.In16thUSENIXSymposiumonNetworkedSystemsDesignandImplementation,February2019.[9]AliMashtizadeh,TalGarnkel,DavidTereiDavidMazières,andMendelRosenblum.Towardspracticaldefault-onmulti-corerecord/replay.InProceedingsoftheSymposiumonArchitecturalSupportforProgrammingLanguagesandOperatingSystems,April2017.[10]AliJoséMashtizadeh,AndreaBittau,DanBoneh,andDavidMazières.CCFI:Crypto-graphicallyenforcedcontrolowintegrity.InProceedingsofthe22ndACMConferenceonComputerandCommunicationsSecurity,Denver,CO,October2015.[11]HenryCorrigan-Gibbs,DanBoneh,andDavidMazières.Riposte:Ananonymousmessagingsystemhandlingmillionsofusers.InProceedingsoftheIEEESymposiumonSecurityandPrivacy,May2015.[12]DeianStefan,EdwardZ.Yang,PetrMarchenko,AlejandroRusso,DaveHerman,BradKarp,andDavidMazières.ProtectingusersbyconningjavascriptwithCOWL.InProceedingsofthe11thSymposiumonOperatingSystemsDesignandImplementation,pages131146,2014.[13]VimalkumarJeyakumar,MohammadAlizadeh,YilongGeng,ChanghoonKim,andDavidMazières.Millionsoflittleminions:Usingpacketsforlowlatencynetworkprogrammingandvisibility.InProceedingsoftheACMSIGCOMMConference,pages314,August2014.[14]EdwardZ.YangandDavidMazières.DynamicspacelimitsforHaskell.InProceedingsofthe35thannualconferenceonProgrammingLanguageDesignandImplementation,pages588598,June2014.[15]AndreaBittau,AdamBelay,AliMashtizadeh,DavidMazières,andDanBoneh.Hack-ingblind.InProceedingsofthe35thSymposiumonSecurityandPrivacy(Oakland),pages227242,May2014.[16]NikhilHandigol,BrandonHeller,VimalkumarJeyakumar,DavidMazières,andNickMcKeown.Iknowwhatyourpacketdidlasthop:Usingpackethistoriestotrou-bleshootnetworks.InProceedingsofthe11thSymposiumonNetworkedSystemsDesignandImplementation,pages7185,Seattle,WA,April2014.[17]AliJoséMashtizadeh,AndreaBittau,YifengFrankHuang,andDavidMazières.Repli-cation,history,andgraftingintheOrilesystem.InProceedingsofthe24thSymposiumonOperatingSystemsPrinciples,pages151166,November2013.[18]DeianStefan,PabloBuiras,EdwardZ.Yang,AmitLevy,DavidTerei,AlejandroRusso,andDavidMazières.Eliminatingcache-basedtimingattackswithinstruction-based4 scheduling.InProceedingsofthe18thEuropeanSymposiumonResearchinComputerSecurity,September2013.[19]PabloBuiras,AmitLevy,DeianStefan,AlejandroRusso,andDavidMazières.Alibraryforremovingcache-basedattacksinconcurrentinformationowsystems.InProceedingsofthe8thInternationalSymposiumonTrustworthyGlobalComputing,August2013.[20]VimalkumarJeyakumar,MohammadAlizadeh,DavidMazières,BalajiPrabhakar,ChanghoonKim,andAlbertGreenberg.EyeQ:Practicalnetworkperformanceiso-lationattheedge.InProceedingsoftheSymposiumonNetworkedSystemsDesignandImplementation,April2013.[21]AdamBelay,AndreaBittau,AliMashtizadeh,DavidTerei,DavidMazières,andChris-tosKozyrakis.Dune:Safeuser-levelaccesstoprivilegedCPUfeatures.InProceedingsofthe10thSymposiumonOperatingSystemsDesignandImplementation,October2012.[22]DanielB.Gin,AmitLevy,DeianStefan,DavidTerei,DavidMazières,JohnMitchell,andAlejandroRusso.Hails:Protectingdataprivacyinuntrustedwebapplications.InProceedingsofthe10thSymposiumonOperatingSystemsDesignandImplementation,October2012.[23]DavidTerei,SimonMarlow,SimonPeytonJones,andDavidMazières.SafeHaskell.InProceedingsofthe5thACMsymposiumonHaskell,September2012.[24]DeianStefan,AlejandroRusso,PabloBuiras,AmitLevy,JohnC.Mitchell,andDavidMazières.Addressingcovertterminationandtimingchannelsinconcurrentinforma-tionowsystems.InProceedingsofthe17thACMSIGPLANInternationalConferenceonFunctionalProgramming(ICFP),September2012.[25]JadNaous,MichaelWalsh,AntonioNicolosi,DavidMazières,MichaelMiller,andArunSeehra.VerifyingandenforcingnetworkpathswithICING.InProceedingsofthe7thACMInternationalConferenceonemergingNetworkingEXperimentsandTechnologies(CoNEXT),December2011.[26]DeianStefan,AlejandroRusso,JohnC.Mitchell,andDavidMazières.Flexibledynamicinformationowcontrolinhaskell.InProceedingsofthe4thSymposiumonHaskell,pages95106,September2011.[27]ArjunRoy,StephenM.Rumble,RyanStutsman,PhilipLevis,DavidMazières,andNickolaiZeldovich.Energymanagementinmobiledeviceswiththecinderoperatingsystem.InProceedingsoftheEuroSys,pages139152,April2011.[28]AndreaBittau,MichaelHamburg,MarkHandley,DavidMazières,andDanBoneh.Thecaseforubiquitoustransport-levelencryption.InProceedingsofthe19thUSENIXSecuritySymposium,August2010.[29]NickolaiZeldovich,SilasBoyd-Wickizer,andDavidMazières.Securingdistributedsystemswithinformationowcontrol.InProceedingsofthe6thSymposiumonNetworkedSystemsDesignandImplementation,pages293308,SanFrancisco,CA,April2008.[30]JinyuanLiandDavidMazières.Beyondone-thirdfaultyreplicasinByzantinefaulttolerantsystems.InProceedingsofthe4thSymposiumonNetworkedSystemsDesignandImplementation,pages131144,Cambridge,MA,April2007.[31]NickolaiZeldovich,SilasBoyd-Wickizer,EddieKohler,andDavidMazières.MakinginformationowexplicitinHiStar.InProceedingsofthe7thSymposiumonOperatingSystemsDesignandImplementation,pages263278,Seattle,WA,November2006.5 [32]MichaelJ.Freedman,KarthikLaskhminarayanan,andDavidMazières.OASIS:Anycastforanyservice.InProceedingsofthe3rdSymposiumonNetworkedSystemsDesignandImplementation,pages129142,SanJose,CA,May2006.[33]ScottGarriss,MichaelKaminsky,MichaelJ.Freedman,BradKarp,DavidMazières,andHaifengYu.Re:Reliableemail.InProceedingsofthe3rdSymposiumonNetworkedSystemsDesignandImplementation,pages297310,SanJose,CA,May2006.[34]PetrosEfstathopoulos,MaxwellKrohn,SteveVanDeBogart,CliFrey,DavidZiegler,EddieKohler,DavidMazières,FransKaashoek,andRobertMorris.LabelsandeventprocessesintheAsbestosoperatingsystem.InProceedingsofthe20thACMSymposiumonOperatingSystemsPrinciples,pages1730,Brighton,UK,October2005.ACM.[35]SiddharthaAnnapureddy,MichaelJ.Freedman,andDavidMazières.Shark:Scalingleserversviacooperativecaching.InProceedingsofthe2ndSymposiumonNetworkedSystemsDesignandImplementation,pages129142,Boston,MA,May2005.[36]JinyuanLi,MaxwellKrohn,DavidMazières,andDennisShasha.Secureuntrusteddatarepository(SUNDR).InProceedingsofthe6thSymposiumonOperatingSystemsDesignandImplementation,pages91106,SanFrancisco,CA,December2004.[37]MichaelKaminsky,EricPeterson,DanielB.Gin,KevinFu,DavidMazières,andM.FransKaashoek.REX:Secure,extensibleremoteexecution.InProceedingsofthe2004USENIX,pages199212,Boston,MA,JuneJuly2004.USENIX.[38]MaxwellN.Krohn,MichaelJ.Freedman,andDavidMazières.On-the-yvericationofratelesserasurecodesforecientcontentdistribution.InProceedingsoftheIEEESymposiumonSecurityandPrivacy,pages226240,Oakland,CA,May2004.[39]MichaelJ.Freedman,EricFreudenthal,andDavidMazières.DemocratizingcontentpublicationwithCoral.InProceedingsofthe1stSymposiumonNetworkedSystemsDesignandImplementation,pages239252,SanFrancisco,CA,March2004.[40]MichaelKaminsky,GeorgeSavvides,DavidMazières,andM.FransKaashoek.De-centralizeduserauthenticationinagloballesystem.InProceedingsofthe19thACMSymposiumonOperatingSystemsPrinciples,pages6073,BoltonLanding,NY,October2003.ACM.[41]NickolaiZeldovich,AlexanderYip,FrankDabek,RobertT.Morris,DavidMazières,andM.FransKaashoek.Multiprocessorsupportforevent-drivenprograms.InProceedingsofthe2003USENIX,pages239252,SanAntonio,TX,June2003.USENIX.[42]AntonioNicolosi,MaxwellKrohn,YevgeniyDodis,andDavidMazières.Proactivetwo-partysignaturesforuserauthentication.InProceedingsofthe10thAnnualNetworkandDistributedSystemSecuritySymposium,pages233248,February2003.[43]DavidMazièresandDennisShasha.BuildingsecurelesystemsoutofByzantinestorage.InProceedingsofthe21stAnnualACMSIGACT-SIGOPSSymposiumonPrinciplesofDistributedComputing,pages108117,July2002.ThefullversionisavailableasNYUcomputersciencedepartmenttechnicalreportTR2002-826,May2002.[44]MarcWaldmanandDavidMazières.Tangleracensorship-resistantpublishingsystembasedondocumententanglements.InProceedingsofthe8thACMConferenceonComputerandCommunicationsSecurity,pages126135,November2001.[45]AthichaMuthitacharoen,BenjieChen,andDavidMazières.Alow-bandwidthnetworklesystem.InProceedingsofthe18thACMSymposiumonOperatingSystemsPrinciples,pages174187,ChateauLakeLouise,Ban,Canada,October2001.ACM.6 [46]DavidMazières.Atoolkitforuser-levellesystems.InProceedingsofthe2001USENIX,pages261274.USENIX,June2001.[47]KevinFu,M.FransKaashoek,andDavidMazières.Fastandsecuredistributedread-onlylesystem.InProceedingsofthe4thSymposiumonOperatingSystemsDesignandImplementation,2000.[48]DavidMazières,MichaelKaminsky,M.FransKaashoek,andEmmettWitchel.Separat-ingkeymanagementfromlesystemsecurity.InProceedingsofthe17thACMSymposiumonOperatingSystemsPrinciples,pages124139,KiawaIsland,SC,December1999.ACM.[49]DavidMazièresandM.FransKaashoek.Thedesign,implementationandoperationofanemailpseudonymserver.InProceedingsofthe5thACMConferenceonComputerandCommunicationsSecurity,pages2736,1998.[50]M.FransKaashoek,DawsonR.Engler,GregoryR.Ganger,HéctorM.Briceño,RussellHunt,DavidMazières,ThomasPinckney,RobertGrimm,JohnJannotti,andKennethMackenzie.Applicationperformanceandexibilityonexokernelsystems.InProceedingsofthe16thACMSymposiumonOperatingSystemsPrinciples,pages5265,Saint-Malo,France,October1997.ACM.[51]J.BradleyChen,YasuhiroEndo,KeeChan,DavidMazières,AntonioDias,MargoSeltzer,andMikeSmith.Themeasuredperformanceofpersonalcomputeroperatingsystems.InProceedingsofthe15thSymposiumonOperatingSystemsPrinciples,pages299313,December1995.Workshops:[52]DmitryKogan,HenriStern,AshleyTolbert,DavidMazières,andKeithWinstein.Thecaseforsecuredelegation.InProceedingsoftheACMworkshoponHotTopicsinNetworks,November2017.[53]VimalkumarJeyakumar,MohammadAlizadeh,ChanghoonKim,andDavidMazières.Tinypacketprogramsforlow-latencynetworkcontrolandmonitoring.InProceedingsofthe12thACMWorkshoponHotTopicsinNetworks,CollegePark,MD,November2013.[54]EdwardZ.Yang,DeianStefan,JohnMitchell,DavidMazières,PetrMarchenko,andBradKarp.Towardprincipledbrowsersecurity.InProceedingsofthe14thWorkshoponHotTopicsinOperatingSystems,May2013.[55]NikhilHandigol,BrandonHeller,VimalkumarJeyakumar,DavidMazières,andNickMcKeown.Whereisthedebuggerformysoftware-denednetwork?InProceedingsoftheWorkshoponHotTopicsinSoftwareDenedNetworking,August2012.[56]VimalkumarJeyakumar,MohammadAlizadeh,DavidMazières,BalajiPrabhakar,andChanghoonKim.EyeQ:Practicalnetworkperformanceisolationforthemulti-tenantcloud.InProceedingsofthe4thUSENIXWorkshoponHotTopicsinCloudComputing,June2012.[57]DeianStefan,AlejandroRusso,DavidMazières,andJohnC.Mitchell.Disjunctioncategorylabels.InProceedingsoftheNordSec2011Conference,October2011.[58]ArunSeehra,JadNaous,MichaelWalsh,DavidMazières,AntonioNicolosi,andScottShenker.Apolicyframeworkforthefutureinternet.InProceedingsofthe8thWorkshoponHotTopicsinNetworks,October2009.[59]JadNaous,RyanStutsman,DavidMazières,NickMcKeown,andNickolaiZeldovich.Delegatingnetworksecuritythroughmoreinformation.InProceedingsoftheWorkshoponResearchonEnterpriseNetworking,August2009.7 [60]StephenM.Rumble,RyanStutsman,PhilipLevis,DavidMazières,andNickolaiZeldovich.Apprehendingjoulethieveswithcinder.InProceedingsoftheFirstACMWorkshoponNetworking,Systems,ApplicationsonMobileHandhelds,August2009.[61]MichaelJ.Freedman,IonStoica,DavidMazières,andScottShenker.Grouptherapyforsystems:Usinglinkattestationstomanagefailures.InProceedingsofthe5thInternationalWorkshoponPeer-to-PeerSystems,SantaBarbara,CA,February2006.[62]MaxwellKrohn,PetrosEfstathopoulos,CliFrey,FransKaashoek,EddieKohler,DavidMazières,RobertMorris,MichelleOsborne,SteveVanDeBogart,andDavidZiegler.Makeleastprivilegearight(notaprivilege).InProceedingsofthe10thWorkshoponHotTopicsinOperatingSystems,SantaFe,NM,June2005.[63]AntonioNicolosiandDavidMazières.Secureacknowledgmentofmulticastmessagesinopenpeer-to-peernetworks.InProceedingsofthe3rdInternationalWorkshoponPeer-to-PeerSystems(IPTPS'04),pages259268,SanDiego,CA,February2004.[64]PetarMaymounkovandDavidMazières.Ratelesscodesandbigdownloads.InProceed-ingsofthe2ndInternationalWorkshoponPeer-to-PeerSystems(IPTPS'03),pages247255,Berkeley,CA,February2003.[65]MichaelFreedmanandDavidMazières.Sloppyhashingandself-organizingclusters.InProceedingsofthe2ndInternationalWorkshoponPeer-to-PeerSystems(IPTPS'03),pages4555,Berkeley,CA,February2003.[66]FrankDabek,NickolaiZeldovich,M.FransKaashoek,DavidMazières,andRobertMorris.Event-drivenprogrammingforrobustsoftware.InProceedingsofthe10thACMSIGOPSEuropeanWorkshop,pages186189,September2002.[67]PetarMaymounkovandDavidMazières.Kademlia:Apeer-to-peerinformationsystembasedontheXORmetric.InProceedingsofthe1stInternationalWorkshoponPeer-to-PeerSystems(IPTPS'02),pages5365,Cambridge,MA,March2002.[68]DavidMazièresandDennisShasha.Don'ttrustyourleserver.InProceedingsofthe8thWorkshoponHotTopicsinOperatingSystems,pages113118,May2001.[69]DavidMazièresandM.FransKaashoek.Escapingtheevilsofcentralizedcontrolwithself-certifyingpathnames.InProceedingsofthe8thACMSIGOPSEuropeanWorkshop,pages118125,1998.[70]DavidMazièresandM.FransKaashoek.Secureapplicationsneedexibleoperatingsystems.InProceedingsofthe6thWorkshoponHotTopicsinOperatingSystems,pages5661,May1997.Non-refereedpublications[71]A.Bittau,D.Gin,M.Handley,D.Mazieres,andE.Smith.TCP-ENO:Encryptionnegotiationoption.RFC8547,RFCEditor,May2019.[72]A.Bittau,D.Gin,M.Handley,D.Mazieres,Q.Slack,andE.Smith.Cryptographicprotectionoftcpstreams(tcpcrypt).RFC8548,RFCEditor,May2019.[73]NicolasBarry,GiulianoLosa,DavidMazieres,JedMcCaleb,andStanislasPolu.Thestellarconsensusprotocol(SCP).Internet-Draftdraft-mazieres-dinrg-scp-05,IETFSecretariat,November2018.http://www.ietf.org/internet-drafts/draft-mazieres-dinrg-scp-05.txt.[74]DavidMazières.TheStellarconsensusprotocol:Afederatedmodelforinternet-levelconsensus.https://www.stellar.org/papers/stellar-consensus-protocol.pdf,April2015.8 [75]NickolaiZeldovich,SilasBoyd-Wickizer,EddieKohler,andDavidMazières.MakinginformationowexplicitinHiStar.CommunicationsoftheACM,54(11):93101,November2011.[76]DanBoneh,DavidMazières,andRalucaAdaPopa.Remoteobliviousstorage:MakingobliviousRAMpractical.TechnicalReportMIT-CSAIL-TR-2011-018,MIT,March2011.[77]JohnOusterhout,ParagAgrawal,DavidErickson,ChristosKozyrakis,JacobLeverich,DavidMazières,SubhasishMitra,AravindNarayanan,DiegoOngaro,GuruParulkar,MendelRosenblum,StephenM.Rumble,EricStratmann,andRyanStutsman.ThecaseforRAMCloud.CommunicationsoftheACM,54(7):121130,July2011.AversionappearedinSIGOPSOSR43(4):92105,January2009.[78]DavidMazières.Blockingunwantedmailwithmailavenger.VirusBulletin,pagesS2S4,July2005.[79]KevinFu,MichaelKaminsky,andDavidMazières.UsingSFSforasecurenetworklesystem.;login:TheMagazineofUsenix&Sage,27(6):616,December2002.[80]DavidMazièresandMichaelD.Smith.Abstractexecutioninamulti-taskingenviron-ment.TechnicalReportTR-31-94,HarvardUniversity,November1994.Non-refereedconference/symposiumpublications[81]DanielGin,StefanHeule,AmitLevy,DavidMazières,JohnMitchell,AlejandroRusso,AmyShen,DeianStefan,DavidTerei,andEdwardZ.Yang.Securityandtheaverageprogrammer.InProceedingsofthe3rdConferenceonPrinciplesofSecurityandTrust,April2014.(invited).[82]NielsProvosandDavidMazières.Afuture-adaptablepasswordscheme.InProceedingsofthe1999USENIX,Freenixtrack(theon-lineversion),Monterey,CA,June1999.USENIX.fromhttp://www.usenix.org/events/usenix99/provos.html.StatementofcustomarypracticesIncomputersystems,paperauthorsaretypicallyorderedfromthegreatesttotheleastamountofeortinvestedinapaper.Amongcoauthorswhoinvestedcomparableeort,authorsarelistedfrommostjuniortomostsenior.Tiesarebrokenalphabetically(orveryoccasionallyreversealphabetically).PatentsNone.Stanford,CA,September4,20199