Trestle: Bridging the Performance and Safety Divide in WebAssembly
by Craig Disselkoen, Tal Garfinkel, Deian Stefan, Conrad Watt.
In Principles of Secure Compilation, 2019.
Towards Practical Default-On Multi-Core Record/Replay
by
Ali Mashtizadeh, Tal Garfinkel, David Terei, David Mazieres, and Mendel Rosenblum.
In Architectural Support for Programming Languages and Operating Systems (ASPLOS 2017)
Full paper:
[pdf]
XvMotion: Unified Virtual Machine Migration Over Long Distance
by
Ali Mashtizadeh, Min Cai, Gabriel Tarasuk-Levin, Ricardo Koller, Tal Garfinkel, Sreekanth Setty
In Usenix Annual Technical Conference, 2014
Full paper:
[pdf]
[bibtex entry]
The Design and Evolution of Live Storage Migration in VMware ESX
by Ali Mashtizadeh, Emré Celebi, Tal Garfinkel, and Min Cai
In Usenix Annual Technical Conference, 2011
Full paper:
[pdf]
[Bibtex Entry]
Multi-stage Replay with Crosscut
by Jim Chow, Dominic Lucchetti, Tal Garfinkel, Geoffrey Lefebvre, Ryan Gardner, Joshua Mason, Sam Small, and Peter M. Chen
In 2010 Conference on Virtual Execution Environments (VEE 2010)
Full paper:
[pdf]
[Bibtex Entry]
Virtual Machine Contracts for Datacenter and Cloud Computing Environments
by Jeanna Mathews, Tal Garfinkel, Christopher Hoff, and Jeff Wheeler
In Proceedings of the First Workshop on Automated Control for Datacenters and Clouds (ACDC09 )
Full paper:
[pdf]
[Bibtex Entry]
Towards Application Security on Untrusted Operating Systems
by Dan Ports and Tal Garfinkel
In Usenix Workshop on Hot Topics in Security (HOTSEC 08)
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Decoupling Dynamic Program Analysis from Execution in Virtual Environments
by Jim Chow, Tal Garfinkel, and Peter M. Chen
In USENIX Annual Technical Conference (USENIX 08), Best Paper Award
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Overshadow: A Virtualization-Based Approach to
Retrofitting Protection in Commodity Operating Systems
by
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,
Pratap Subrahmanyam,
Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, Dan R.K. Ports
In Architectural Support for
Programming Languages and Operating Systems (ASPLOS 2008)
Full paper:
[ps]
[pdf]
[Bibtex Entry]
What Virtualization can do for Security
by Tal Garfinkel, Andrew Warfield
In ;login: The USENIX Magazine, December 2007
Full paper:
[Bibtex Entry]
[pdf]
Reducing Shoulder-surfing by Using Gaze-based Password Entry
by
Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd
In Symposium On Usable Privacy and Security (SOUPS 07)
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Compatibility is Not Transparency: VMM Detection
Myths and Realities
by Tal Garfinkel, Keith Adams, Andrew Warfield, Jason Franklin
In the 11th Workshop on Hot Topics in Operating Systems (HOTOS-X).
Full paper:
[ps]
[pdf]
[Bibtex Entry]
SANE: A Protection Architecture for Enterprise Networks
by Martin Casado,Tal Garfinkel, Aditya Akella, Michael Freedman, Dan Boneh, Nick McKweon, Scott Shenker
In 15th USENIX Security Symposium (Security '06)
Full paper:
[pdf]
[Bibtex Entry]
Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual
Disks
by Ben Pfaff,Tal Garfinkel, Mendel Rosenblum
3rd Symposium on Networked Systems Design and Implementation (NSDI 06)
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Opportunistic Measurement: Extracting Insight from Spurious Traffic
by Martin Casado,Tal Garfinkel, Weidong Cu, Vern Paxson and Stefan Savage
4th Workshop on Hot Topics in Networks (HOTNETS-IV).
Full paper:
[ps]
[pdf]
[Bibtex Entry]
When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments
by Tal Garfinkel and Mendel Rosenblum
10th Workshop on Hot Topics in Operating Systems (HOTOS-X).
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation
by Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum
14th USENIX Security Symposium (Security '05)
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Virtual Machine Monitors: Current Technology and Future Trends
by Mendel Rosenblum and Tal Garfinkel
IEEE Computer, May 2005
Full paper:
[pdf]
[Bibtex Entry]
Data Lifetime is a Systems Problem
by Tal Garfinkel, Ben Pfaff, Jim Chow, and Mendel Rosenblum
SIGOPS European Workshop 2004
Full paper:
[ps]
[pdf]
[Bibtex entry]
Understanding Data Lifetime via Whole System Simulation
by Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum
13th USENIX Security Symposium (Security '04), Best Paper Award
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Ostia: A Delegating Architecture for Secure System Call Interposition
by
Tal Garfinkel, Ben Pfaff and Mendel Rosenblum
Internet Society's 2004 Symposium on Network and Distributed System Security (NDSS 2004).
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Terra: A Virtual Machine-Based Platform for Trusted Computing. by
Tal Garfinkel,Ben Pfaff,Jim Chow,Mendel Rosenblum, Dan Boneh
19th ACM Symposium on Operating Systems Principles (SOSP 2003) .
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Flexible OS Support and Applications for Trusted Computing
. by
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
9th Workshop on Hot Topics in Operating Systems (HOTOS-IX).
Full paper:
[ps]
[pdf]
[Bibtex Entry]
A Virtual Machine Introspection Based Architecture for Intrusion Detection
. by
Tal Garfinkel and Mendel Rosenblum
Internet Society's 2003 Symposium on Network and Distributed System Security (NDSS 2003).
Full paper:
[ps]
[pdf]
[Bibtex Entry]
Traps and Pitfalls:
Practical Problems in System Call Interposition Based Security Tools. by
Tal Garfinkel
Internet Society's 2003 Symposium on Network and Distributed System Security (NDSS 2003).
Full paper:
[ps]
[pdf]
[Bibtex Entry]