Follow
Ariel J. Feldman
Ariel J. Feldman
Assistant Professor of Computer Science, University of Chicago
Verified email at cs.uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
17072009
SPORC: Group Collaboration using Untrusted Cloud Resources.
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX conference on Operating systems design and implementation (OSDI …, 2010
3692010
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) 13, 2007
2632007
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
24th ACM Symposium on Operating Systems Principles (SOSP '13), 341-357, 2013
2012013
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
1432009
Social networking with Frientegrity: privacy and integrity with an untrusted provider
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
21st USENIX Security Symposium (Sec '12) 12, 2012
842012
Source code review of the Diebold voting system
JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller
University of California, Berkeley under contract to the California …, 2007
572007
Internet Filters: A Public Policy Report, Second Edition
M Heins, C Cho, A Feldman
Brennan Center for Justice at NYU School of Law, 2006
50*2006
Verifiable differential privacy
A Narayan, A Feldman, A Papadimitriou, A Haeberlen
Proceedings of the Tenth European Conference on Computer Systems, 1-14, 2015
252015
Using differential privacy to efficiently mitigate side channels in distributed analytics
M Xu, A Papadimitriou, A Feldman, A Haeberlen
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
142018
On subliminal channels in encrypt-on-cast voting systems
AJ Feldman, J Benaloh
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
142009
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
B Dickens III, HS Gunawi, AJ Feldman, H Hoffmann
Proceedings of the Twenty-Third International Conference on Architectural …, 2018
122018
Hermetic: Privacy-preserving distributed analytics without (most) side channels
M Xu, A Papadimitriou, A Haeberlen, A Feldman
External Links: Link Cited by, 2019
82019
Privacy and Integrity are Possible in the Untrusted Cloud.
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
IEEE Data Eng. Bull. 35 (4), 73-82, 2012
82012
Privacy and integrity in the untrusted cloud
AJ Feldman
Princeton University, 2012
82012
Lemonade from lemons: Harnessing device wearout to create limited-use security architectures
Z Deng, A Feldman, SA Kurtz, FT Chong
ACM SIGARCH Computer Architecture News 45 (2), 361-374, 2017
52017
AVC Advantage: Hardware functional specifications
JA Halderman, AJ Feldman
Technical Report TR-816-08, Department of Computer Science, Princeton …, 2008
52008
Verifying computations with state (extended version)
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
Cryptology ePrint Archive, 2013
22013
Stream ciphers for digital storage encryption
B Dickens III, H Gunawi, A Feldman, H Hoffmann
US Patent 11,139,959, 2021
12021
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
12009
The system can't perform the operation now. Try again later.
Articles 1–20