Follow
Ariel J. Feldman
Ariel J. Feldman
Software Engineer, Google
Verified email at arifeldman.com - Homepage
Title
Cited by
Cited by
Year
Lest We Remember: Cold-Boot Attacks on Encryption Keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
17th USENIX Security Symposium (Sec '08), 2008
18212008
SPORC: Group Collaboration using Untrusted Cloud Resources.
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX conference on Operating systems design and implementation (OSDI …, 2010
3832010
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) 13, 2007
2642007
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
24th ACM Symposium on Operating Systems Principles (SOSP '13), 341-357, 2013
2292013
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
1432009
Social networking with Frientegrity: privacy and integrity with an untrusted provider
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
21st USENIX Security Symposium (Sec '12), 2012
852012
Source code review of the Diebold voting system
JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller
University of California, Berkeley under contract to the California …, 2007
582007
Internet Filters: A Public Policy Report, Second Edition
M Heins, C Cho, A Feldman
Brennan Center for Justice at NYU School of Law, 2006
55*2006
Verifiable differential privacy
A Narayan, A Feldman, A Papadimitriou, A Haeberlen
Proceedings of the Tenth European Conference on Computer Systems, 1-14, 2015
342015
Using differential privacy to efficiently mitigate side channels in distributed analytics
M Xu, A Papadimitriou, A Feldman, A Haeberlen
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
192018
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
B Dickens III, HS Gunawi, AJ Feldman, H Hoffmann
Proceedings of the Twenty-Third International Conference on Architectural …, 2018
162018
On subliminal channels in encrypt-on-cast voting systems
AJ Feldman, J Benaloh
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
132009
Hermetic: Privacy-preserving distributed analytics without (most) side channels
M Xu, A Papadimitriou, A Haeberlen, A Feldman
External Links: Link Cited by, 2019
102019
Privacy and integrity in the untrusted cloud
AJ Feldman
Princeton University, 2012
92012
Privacy and Integrity are Possible in the Untrusted Cloud
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
IEEE Data Eng. Bull. 35 (4), 73-82, 2012
72012
Lemonade from lemons: Harnessing device wearout to create limited-use security architectures
Z Deng, A Feldman, SA Kurtz, FT Chong
ACM SIGARCH Computer Architecture News 45 (2), 361-374, 2017
62017
AVC Advantage: Hardware functional specifications
JA Halderman, AJ Feldman
Technical Report TR-816-08, Department of Computer Science, Princeton …, 2008
52008
Verifying computations with state (extended version)
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
Cryptology ePrint Archive, 2013
32013
Internet Filters
M Heins, C Cho, A FELDMAN
A Public Policy Report, Free Expression Policy Project, National Coalition …, 2001
22001
Integration of third-party encryption key managers with cloud services
IS Lee, SD Telang, JC Chau, TM Dierks, AJ Feldman, HJ Freyer, N Keidar, ...
US Patent 11,611,558, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20