


default search action
Stefan Saroiu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Bohdan Borysei
, Stefan Saroiu
, Eyal de Lara
:
Towards Multi-Stakeholder Clouds. HotMobile 2024: 47-52 - [c58]Bohdan Borysei
, Stefan Saroiu
, Eyal de Lara
:
Poster: Towards Multi-Stakeholder Clouds. HotMobile 2024: 146 - 2023
- [j7]Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng:
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing. Proc. Priv. Enhancing Technol. 2023(3): 252-267 (2023) - [c57]Paramvir Bahl
, Matthew Balkwill
, Xenofon Foukas
, Anuj Kalia
, Daehyeok Kim
, Manikanta Kotaru
, Zhihua Lai
, Sanjeev Mehrotra
, Bozidar Radunovic
, Stefan Saroiu
, Connor Settle
, Ankit Verma
, Alec Wolman
, Francis Y. Yan
, Yongguang Zhang
:
Accelerating Open RAN Research Through an Enterprise-scale 5G Testbed. MobiCom 2023: 138:1-138:3 - [c56]Kevin Loughlin
, Jonah Rosenblum
, Stefan Saroiu
, Alec Wolman
, Dimitrios Skarlatos
, Baris Kasikci
:
Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer. SOSP 2023: 417-433 - 2022
- [c55]Stefan Saroiu, Alec Wolman, Lucian Cojocar:
The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses. IRPS 2022: 2 - [c54]Kevin Loughlin, Stefan Saroiu, Alec Wolman, Yatin A. Manerkar, Baris Kasikci
:
MOESI-prime: preventing coherence-induced hammering in commodity workloads. ISCA 2022: 670-684 - 2021
- [c53]Kevin Loughlin, Stefan Saroiu, Alec Wolman, Baris Kasikci
:
Stop! Hammer time: rethinking our approach to rowhammer mitigations. HotOS 2021: 88-95 - [c52]Seyed Mohammadjavad Seyed Talebi
, Ardalan Amiri Sani, Stefan Saroiu, Alec Wolman:
MegaMind: a platform for security & privacy extensions for voice assistants. MobiSys 2021: 109-121 - 2020
- [c51]Behnaz Arzani, Selim Ciraci, Stefan Saroiu, Alec Wolman, Jack W. Stokes, Geoff Outhred, Lechao Diwu:
PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud. NSDI 2020: 797-815 - [c50]Lucian Cojocar
, Jeremie S. Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu:
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. SP 2020: 712-728 - [i1]Lucian Cojocar, Jeremie S. Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu:
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. CoRR abs/2003.04498 (2020)
2010 – 2019
- 2019
- [c49]Lillian Tsai, Roberta De Viti, Matthew Lentz, Stefan Saroiu, Bobby Bhattacharjee, Peter Druschel:
enClosure: Group Communication via Encounter Closures. MobiSys 2019: 353-365 - [c48]Lillian Tsai, Roberta De Viti, Matthew Lentz, Stefan Saroiu, Bobby Bhattacharjee, Peter Druschel:
enClosure: Group Communication via Encounter Closures. MobiSys 2019: 541-542 - 2018
- [e3]Jörg Ott, Falko Dressler, Stefan Saroiu, Prabal Dutta:
Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2018, Munich, Germany, June 10-15, 2018. ACM 2018 [contents] - 2016
- [c47]Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Löser, Dennis Mattoon, Magnus Nyström, David Robinson, Rob Spiger, Stefan Thom, David Wooten:
fTPM: A Software-Only Implementation of a TPM Chip. USENIX Security Symposium 2016: 841-856 - 2015
- [c46]Patrick Colp, Jiawen Zhang, James Gleeson, Sahil Suneja, Eyal de Lara, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Protecting Data on Smartphones and Tablets from Memory Attacks. ASPLOS 2015: 177-189 - [c45]Eduardo Cuervo, Alec Wolman, Landon P. Cox, Kiron Lebeck, Ali Razeen, Stefan Saroiu, Madanlal Musuvathi:
Kahawai: High-Quality Mobile Gaming Using GPU Offload. MobiSys 2015: 121-135 - [c44]Stefan Saroiu, Alec Wolman, Sharad Agarwal:
Policy-Carrying Data: A Privacy Abstraction for Attaching Terms of Service to Mobile Data. HotMobile 2015: 129-134 - 2014
- [j6]Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. login Usenix Mag. 39(4) (2014) - [c43]Nuno Santos
, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Using ARM trustzone to build a trusted language runtime for mobile applications. ASPLOS 2014: 67-80 - [c42]Christopher Smowton, Jacob R. Lorch, David Molnar, Stefan Saroiu, Alec Wolman:
Zero-effort payments: design, deployment, and lessons. UbiComp 2014: 763-774 - [c41]Eduardo Cuervo, Alec Wolman, Landon P. Cox, Stefan Saroiu, Madanlal Musuvathi, Ali Razeen:
Demo: Kahawai: high-quality mobile gaming using GPU offload. MobiSys 2014: 345 - [c40]Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. NSDI 2014: 187-201 - 2013
- [c39]Himanshu Raj, Stefan Saroiu, Alec Wolman, Jitendra Padhye:
Splitting the bill for mobile data with SIMlets. HotMobile 2013: 1 - 2012
- [c38]Anh Nguyen, Himanshu Raj, Shravan K. Rayanchu, Stefan Saroiu, Alec Wolman:
Delusional boot: securing hypervisors without massive re-engineering. EuroSys 2012: 141-154 - [c37]He Liu, Stefan Saroiu, Alec Wolman, Himanshu Raj:
Software abstractions for trusted sensors. MobiSys 2012: 365-378 - [c36]Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. Bernheim Brush, Bongshin Lee, Stefan Saroiu, Paramvir Bahl:
An Operating System for the Home. NSDI 2012: 337-352 - [c35]Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi
, Stefan Saroiu:
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. USENIX Security Symposium 2012: 175-188 - [c34]Bimal Viswanath, Emre Kiciman, Stefan Saroiu:
Keeping information safe from social networking apps. WOSN 2012: 49-54 - [e2]Balachander Krishnamurthy, Stefan Saroiu, Ben Y. Zhao:
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, WOSN 2012, Helsinki, Finland, August 17, 2012. ACM 2012, ISBN 978-1-4503-1480-0 [contents] - 2011
- [c33]A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, Colin Dixon:
Home automation in the wild: challenges and opportunities. CHI 2011: 2115-2124 - [c32]Nuno Santos
, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Trusted language runtime (TLR): enabling trusted applications on smartphones. HotMobile 2011: 21-26 - 2010
- [c31]Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. Bernheim Brush, Bongshin Lee, Stefan Saroiu, Victor Bahl:
The home needs an operating system (and an app store). HotNets 2010: 18 - [c30]Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, Paramvir Bahl:
MAUI: making smartphones last longer with code offload. MobiSys 2010: 49-62 - [c29]Sharad Agarwal, John Dunagan, Navendu Jain, Stefan Saroiu, Alec Wolman:
Volley: Automated Data Placement for Geo-Distributed Cloud Services. NSDI 2010: 17-32 - [c28]Marcel Dischinger, Massimiliano Marcon, Saikat Guha, P. Krishna Gummadi, Ratul Mahajan, Stefan Saroiu:
Glasnost: Enabling End Users to Detect Traffic Differentiation. NSDI 2010: 405-418 - [c27]Alec Wolman, Stefan Saroiu, Victor Bahl:
Using Trusted Sensors to Monitor Patients' Habits. HealthSec 2010 - [c26]Stefan Saroiu, Alec Wolman:
I am a sensor, and I approve this message. HotMobile 2010: 37-42
2000 – 2009
- 2009
- [j5]Boon Thau Loo
, Stefan Saroiu:
5th international workshop on networking meets databases (NetDB 2009). SIGMOD Rec. 38(4): 49-50 (2009) - [j4]Boon Thau Loo
, Stefan Saroiu:
5th international workshop on networking meets databases (NetDB 2009). ACM SIGOPS Oper. Syst. Rev. 43(4): 17-18 (2009) - [c25]Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, Alec Wolman:
Lockr: better privacy for social networks. CoNEXT 2009: 169-180 - [c24]Timothy J. Smith, Stefan Saroiu, Alec Wolman:
BlueMonarch: a system for evaluating bluetooth applications in the wild. MobiSys 2009: 41-54 - [c23]Andrew G. Miklas, Stefan Saroiu, Alec Wolman, Angela Demke Brown:
Bunker: A Privacy-Oriented Platform for Network Tracing. NSDI 2009: 29-42 - [c22]Stefan Saroiu, Alec Wolman:
Enabling new mobile applications with location proofs. HotMobile 2009 - 2008
- [c21]Troy Ronda, Stefan Saroiu, Alec Wolman:
Itrustpage: a user-assisted anti-phishing tool. EuroSys 2008: 261-272 - [c20]Waqas ur Rehman, Eyal de Lara, Stefan Saroiu:
CILoS: a CDMA indoor localization system. UbiComp 2008: 104-113 - [c19]Stefan Saroiu, Alec Wolman:
SpySaver: using incentives to address spyware. NetEcon 2008: 37-42 - [c18]Marcel Dischinger, Andreas Haeberlen
, Ivan Beschastnikh, P. Krishna Gummadi
, Stefan Saroiu:
Satellitelab: adding heterogeneity to planetary-scale network testbeds. SIGCOMM 2008: 315-326 - [c17]Amin Tootoonchian, Kiran K. Gollu, Stefan Saroiu, Yashar Ganjali, Alec Wolman:
Lockr: social access control for web 2.0. WOSN 2008: 43-48 - [e1]Adriana Iamnitchi, Stefan Saroiu:
Proceedings of the 7th international conference on Peer-to-peer systems, IPTPS'08, Tampa, FL, USA, February 25-26, 2008. USENIX 2008 [contents] - 2007
- [c16]Andrew G. Miklas, Stefan Saroiu, Alec Wolman, Angela Demke Brown:
Tamper Resistant Network Tracing. HotNets 2007 - [c15]Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Chan, Stefan Saroiu, P. Krishna Gummadi, Eyal de Lara:
Exploiting Social Interactions in Mobile Systems. UbiComp 2007: 409-428 - [c14]Marcel Dischinger, Andreas Haeberlen, P. Krishna Gummadi
, Stefan Saroiu:
Characterizing residential broadband networks. Internet Measurement Conference 2007: 43-56 - [c13]Matei A. Zaharia, Amit Chandel, Stefan Saroiu, Srinivasan Keshav:
Finding Content in File-Sharing Networks When You Can't Even Spell. IPTPS 2007 - 2006
- [c12]Andreas Haeberlen
, Marcel Dischinger, P. Krishna Gummadi
, Stefan Saroiu:
Monarch: a tool to emulate transport protocol flowsover the internet at large. Internet Measurement Conference 2006: 105-118 - [c11]Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel:
A preliminary investigation of worm infections in a bluetooth environment. WORM 2006: 9-16 - 2004
- [c10]Stefan Saroiu, Steven D. Gribble
, Henry M. Levy:
Measurement and Analysis of Spyware in a University Environment. NSDI 2004: 141-153 - 2003
- [j3]Stefan Saroiu, P. Krishna Gummadi
, Steven D. Gribble
:
Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multim. Syst. 9(2): 170-184 (2003) - [c9]P. Krishna Gummadi
, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble
, Henry M. Levy, John Zahorjan:
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. SOSP 2003: 314-329 - [c8]Nicholas J. A. Harvey, Michael B. Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman:
SkipNet: A Scalable Overlay Network with Practical Locality Properties. USENIX Symposium on Internet Technologies and Systems 2003 - 2002
- [j2]P. Krishna Gummadi
, Stefan Saroiu, Steven D. Gribble
:
A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. Comput. Commun. Rev. 32(1): 82 (2002) - [j1]P. Krishna Gummadi
, Stefan Saroiu, Steven D. Gribble
:
King: estimating latency between arbitrary internet end hosts. Comput. Commun. Rev. 32(3): 11 (2002) - [c7]P. Krishna Gummadi
, Stefan Saroiu, Steven D. Gribble
:
King: estimating latency between arbitrary internet end hosts. Internet Measurement Workshop 2002: 5-18 - [c6]Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble:
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS. IPTPS 2002: 214-224 - [c5]Jared Saia, Amos Fiat, Steven D. Gribble, Anna R. Karlin, Stefan Saroiu:
Dynamically Fault-Tolerant Content Addressable Networks. IPTPS 2002: 270-279 - [c4]Stefan Saroiu, P. Krishna Gummadi
, Richard J. Dunn, Steven D. Gribble
, Henry M. Levy:
An Analysis of Internet Content Delivery Systems. OSDI 2002 - 2001
- [c3]Michael B. Jones, John Regehr, Stefan Saroiu:
Two Case Studies in Predictable Application Scheduling Using Rialto/NT. IEEE Real Time Technology and Applications Symposium 2001: 157-164 - [c2]Michael B. Jones, Stefan Saroiu:
Predictability requirements of a soft modem. SIGMETRICS/Performance 2001: 37-49 - 2000
- [c1]Zachary G. Ives
, Alon Y. Levy, Jayant Madhavan, Rachel Pottinger, Stefan Saroiu, Igor Tatarinov, Shiori Betzler, Qiong Chen, Ewa Jaslikowska, Jing Su, Wai Tak Theodora Yeung:
Self-Organizing Data Sharing Communities with SAGRES. SIGMOD Conference 2000: 582
Coauthor Index
aka: P. Krishna Gummadi

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint