default search action
Manuel Costa
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code? Commun. ACM 67(1): 68-76 (2024) - [j10]Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa:
Confidential Container Groups. Commun. ACM 67(10): 40-49 (2024) - [j9]Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa:
Confidential Container Groups: Implementing confidential computing on Azure container instances. ACM Queue 22(2) (2024) - 2023
- [j8]Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cédric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger:
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability. Proc. VLDB Endow. 17(2): 225-240 (2023) - [j7]Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy. ACM Queue 21(4): 94-122 (2023) - [i6]Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa:
COCOAEXPO: Confidential Containers via Attested Execution Policies. CoRR abs/2302.03976 (2023) - [i5]Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cédric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger:
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability. CoRR abs/2310.11559 (2023) - 2022
- [c27]Alex Shamis, Peter R. Pietzuch, Burcu Canakci, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Olga Vrousgou, Christoph M. Wintersteiger, Manuel Costa, Mark Russinovich:
IA-CCF: Individual Accountability for Permissioned Ledgers. NSDI 2022: 467-491 - [i4]Alex Shamis, Peter R. Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa:
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement. CoRR abs/2205.15757 (2022) - 2021
- [j6]Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia:
Toward confidential cloud computing. Commun. ACM 64(6): 54-61 (2021) - [j5]Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia:
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use. ACM Queue 19(1): 49-76 (2021) - [c26]Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa M. Redmiles, Alex Shamis, Isha Sharma, John C. Simmons, Sam Wenker, Anika Zaman:
AMP: authentication of media via provenance. MMSys 2021: 108-121 - [i3]Alex Shamis, Peter R. Pietzuch, Miguel Castro, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Cédric Fournet, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich:
PAC: Practical Accountability for CCF. CoRR abs/2105.13116 (2021) - 2020
- [i2]Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Shabnam Erfani, Kevin Kane, Alex Shamis:
AMP: Authentication of Media via Provenance. CoRR abs/2001.07886 (2020)
2010 – 2019
- 2018
- [c25]Christian Priebe, Kapil Vaswani, Manuel Costa:
EnclaveDB: A Secure Database Using SGX. IEEE Symposium on Security and Privacy 2018: 264-278 - 2017
- [j4]Gregg R. Rabideau, Steve A. Chien, M. Galer, Federico Nespoli, Manuel Costa:
Managing Spacecraft Memory Buffers with Concurrent Data Collection and Downlink. J. Aerosp. Inf. Syst. 14(12): 637-651 (2017) - [j3]Matthew J. Parkinson, Dimitrios Vytiniotis, Kapil Vaswani, Manuel Costa, Pantazis Deligiannis, Dylan McDermott, Aaron Blankstein, Jonathan Balkind:
Project snowflake: non-blocking safe manual memory management in .NET. Proc. ACM Program. Lang. 1(OOPSLA): 95:1-95:25 (2017) - [c24]Piyus Kedia, Manuel Costa, Matthew J. Parkinson, Kapil Vaswani, Dimitrios Vytiniotis, Aaron Blankstein:
Simple, fast, and safe manual memory management. PLDI 2017: 233-247 - [c23]Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, István Haller, Manuel Costa:
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. USENIX Security Symposium 2017: 217-233 - [i1]Manuel Costa, Lawrence Esswood, Olga Ohrimenko, Felix Schuster, Sameer Wagh:
The Pyramid Scheme: Oblivious RAM for Trusted Processors. CoRR abs/1712.07882 (2017) - 2016
- [c22]Rohit Sinha, Manuel Costa, Akash Lal, Nuno P. Lopes, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani:
A design and verification methodology for secure isolated regions. PLDI 2016: 665-681 - [c21]Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa:
Oblivious Multi-Party Machine Learning on Trusted Processors. USENIX Security Symposium 2016: 619-636 - 2015
- [c20]Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, Divya Sharma:
Observing and Preventing Leakage in MapReduce. CCS 2015: 1570-1581 - [c19]Ionel Gog, Jana Giceva, Malte Schwarzkopf, Kapil Vaswani, Dimitrios Vytiniotis, Ganesan Ramalingam, Manuel Costa, Derek Gordon Murray, Steven Hand, Michael Isard:
Broom: Sweeping Out Garbage Collection from Big Data Systems. HotOS 2015 - [c18]Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich:
VC3: Trustworthy Data Analytics in the Cloud Using SGX. IEEE Symposium on Security and Privacy 2015: 38-54 - 2014
- [c17]Tomasz Kuchta, Cristian Cadar, Miguel Castro, Manuel Costa:
Docovery: toward generic automatic document recovery. ASE 2014: 563-574 - 2010
- [c16]Jean-Phillipe Martin, Michael Hicks, Manuel Costa, Periklis Akritidis, Miguel Castro:
Dynamically checking ownership policies in concurrent c/c++ programs. POPL 2010: 457-470 - [e2]Manuel Costa, Engin Kirda:
Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010. ACM 2010, ISBN 978-1-4503-0059-9 [contents]
2000 – 2009
- 2009
- [c15]Miguel Castro, Manuel Costa, Jean-Philippe Martin, Marcus Peinado, Periklis Akritidis, Austin Donnelly, Paul Barham, Richard Black:
Fast byte-granularity software fault isolation. SOSP 2009: 45-58 - [c14]Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand:
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. USENIX Security Symposium 2009: 51-66 - [e1]Evangelos P. Markatos, Manuel Costa:
Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009. ACM 2009, ISBN 978-1-60558-472-0 [contents] - 2008
- [j2]Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham:
Vigilante: End-to-end containment of Internet worm epidemics. ACM Trans. Comput. Syst. 26(4): 9:1-9:68 (2008) - [c13]Miguel Castro, Manuel Costa, Jean-Philippe Martin:
Better bug reporting with better privacy. ASPLOS 2008: 319-328 - [c12]Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro:
Preventing Memory Error Exploits with WIT. SP 2008: 263-277 - 2007
- [b1]Manuel Costa:
End-to-end containment of internet worm epidemics. University of Cambridge, UK, 2007 - [c11]Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Zhang, Marcus Peinado:
Bouncer: securing software by blocking bad input. SOSP 2007: 117-130 - 2006
- [c10]Miguel Castro, Manuel Costa, Tim Harris:
Securing Software by Enforcing Data-flow Integrity. OSDI 2006: 147-160 - 2005
- [c9]Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien:
A First Look at Peer-to-Peer Worms: Threats and Defenses. IPTPS 2005: 24-35 - [c8]Miguel Castro, Manuel Costa, Antony I. T. Rowstron:
Debunking Some Myths About Structured and Unstructured Overlays. NSDI 2005 - [c7]Tiago de Sousa Pedrosa, Âgela Guimarães Pereira, Nuno Cardoso, Manuel Costa, Tiago Carita, Edmundo Nobre, Pedro Pedrosa, Nuno Capeta, Sérgio Estêvão:
3D environments as social learning tools: the VIRTU@LIS experience. SIGGRAPH Educators Program 2005: 1 - [c6]Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham:
Vigilante: end-to-end containment of internet worms. SOSP 2005: 133-147 - 2004
- [j1]Miguel Castro, Manuel Costa, Antony I. T. Rowstron:
Should we build Gnutella on a structured overlay? Comput. Commun. Rev. 34(1): 131-136 (2004) - [c5]Miguel Castro, Manuel Costa, Antony I. T. Rowstron:
Performance and Dependability of Structured Peer-to-Peer Overlays. DSN 2004: 9-18 - [c4]Manuel Costa, Miguel Castro, Antony I. T. Rowstron, Peter B. Key:
PIC: Practical Internet Coordinates for Distance Estimation. ICDCS 2004: 178-187 - 2003
- [c3]José Danado, A. Eduardo Dias, Teresa Romão, Nuno Correia, Adelaide Trabuco, Carlos Santos, David Araújo, Pedro Duarte, Rui Rebocho, José Palmeiro, João Serpa, Manuel Costa, António S. Câmara:
Mobile Augmented Reality for Environmental Management (MARE). Eurographics (Short Presentations) 2003
1990 – 1999
- 1996
- [c2]Miguel Castro, Manuel Sequeira, Manuel Costa, Paulo Guedes:
Efficient and Flexible Object Sharing. ICPP, Vol. 1 1996: 128-137 - [c1]Manuel Costa, Paulo Guedes, Manuel Sequeira, Nuno Neves, Miguel Castro:
Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. OSDI 1996: 59-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint