Papers
- NOPE: Strengthening domain authentication with succinct proofs
Zachary DeStefano, Jeff J. Ma, Joseph Bonneau, and Michael Walfish
30th ACM Symposium on Operating Systems Principles
SOSP 2024,
Austin, TX, November 2024. [pdf]
- Efficient Auditing of Event-driven Web Applications
Ioanna Tzialla, Jeffery Wang, Jingyi Zhu, Aurojit Panda, and
Michael Walfish
ACM European Conference on Computer Systems
EuroSys 2024,
Athens, Greece, April 2024.
- Zombie: Middleboxes that Don't Snoop
Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau,
Paul Grubbs, and Michael Walfish
21st USENIX Symposium on Networked Systems Design and Implementation
NSDI
2024, Santa Clara, CA, April 2024. [pdf]
- Less is more: refinement proofs for
probabilistic proofs
Kunming Jiang, Devora Chait-Roth, Zachary DeStefano,
Michael Walfish, and Thomas Wies
IEEE Symposium on Security and Privacy
Oakland
2023, San Franciso, CA, May 2023.
- Zero-Knowledge Middleboxes
Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, and Michael
Walfish
31st USENIX Security Symposium
Security
2022, Boston, MA, August 2022. [pdf]
- Cobra: Making Transactional Key-Value Stores Verifiably Serializable
Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish
14th USENIX Symposium on Operating Systems Design and
Implementation
OSDI 2020,
November 2020. [pdf]
- Doubly-efficient zkSNARKs without trusted setup
Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, and Michael Walfish
IEEE Symposium on Security and Privacy
Oakland
2018, San Franciso, CA, May 2018. [pdf]
- The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web
Cheng Tan, Lingfan Yu, Joshua B. Leners, and Michael Walfish
26th ACM Symposium on Operating Systems Principles
SOSP 2017,
Shanghai, China, October 2017. [pdf]
- Full accounting for verifiable outsourcing
Riad Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat,
Justin Thaler, Michael Walfish, and Thomas Wies
ACM Conference on Computer and Communications Security
CCS 2017, Dallas, TX, October 2017. [pdf]
- Pretzel: Email encryption and provider-supplied functions are compatible
Trinabh Gupta, Henrique Fingler, Lorenzo Alvisi, and Michael Walfish
ACM SIGCOMM 2017, Los Angeles, CA, August 2017. [pdf]
- Defending against malicious peripherals with Cinch
Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners,
Michael Spilo, Zhen Sun, Andrew J. Blumberg, and Michael Walfish
25th USENIX Security Symposium
Security 2016, Austin, TX, August 2016. [pdf]
- Verifiable ASICs
Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, and Michael Walfish
IEEE Symposium on Security and Privacy
Oakland
2016, San Jose, CA, May 2016.
[pdf]
- Distinguished student paper award.
- Scalable and private media consumption with Popcorn
Trinabh Gupta, Natacha Crooks, Whitney Mulhern,
Srinath Setty, Lorenzo Alvisi, and Michael Walfish
13th USENIX Symposium on Networked Systems Design and Implementation
NSDI
2016, Santa Clara, CA, March 2016. [pdf]
- Yesquel: Scalable SQL storage for Web applications
Marcos K. Aguilera, Joshua B. Leners, and Michael Walfish
25th ACM Symposium on Operating Systems Principles
SOSP 2015,
Monterey, CA, October 2015. [pdf]
-
Taming uncertainty in distributed systems with help from the network
Joshua B. Leners, Trinabh Gupta, Marcos K. Aguilera, and Michael Walfish
ACM European Conference on Computer Systems
EuroSys 2015,
Bordeaux, France, April 2015. [pdf]
- Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby, Srinath Setty, Zuocheng Ren, Andrew J. Blumberg, and Michael Walfish
22nd Network and Distributed System Security
Symposium
NDSS 2015,
San Diego, CA, February 2015. [pdf]
- A slightly longer version is available as Cryptology ePrint 2014/674, with Max Howald as an additional author
[pdf]
- Verifying
computations without reexecuting them: from theoretical
possibility to near-practicality
Michael Walfish and Andrew J. Blumberg
Communications of the ACM (CACM),
Volume 58, Number 2, pages 74–84, February 2015.
- Verifiable computation using multiple provers
Andrew J. Blumberg, Justin Thaler, Victor Vu, and Michael Walfish
Cryptology ePrint 2014/846 [pdf]
- Verifying computations with
state
Benjamin Braun, Ariel J. Feldman, Zuocheng Ren,
Srinath Setty, Andrew J. Blumberg, and Michael Walfish
24th ACM Symposium on Operating Systems Principles
SOSP 2013,
Farmington, PA, November 2013. [pdf]
- Verifiable
auctions for online ad exchanges
Sebastian Angel and Michael Walfish
ACM
SIGCOMM 2013, Hong Kong, China, August 2013.
[pdf]
- A hybrid architecture for interactive verifiable
computation
Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael
Walfish
IEEE Symposium on Security and Privacy
Oakland
2013, San Francisco, CA, May 2013.
[pdf]
- Resolving the
conflict between generality and plausibility in verified
computation
Srinath Setty, Benjamin Braun, Victor Vu,
Andrew J. Blumberg, Bryan Parno, and Michael Walfish
ACM European Conference on Computer Systems
EuroSys 2013,
Prague, Czech Republic, April 2013. [pdf]
- Improving availability in distributed systems with
failure informers
Joshua B. Leners, Trinabh Gupta, Marcos K. Aguilera, and Michael
Walfish
10th USENIX Symposium on Networked Systems Design and Implementation
NSDI
2013, Lombard, IL, April 2013. [pdf]
- Taking proof-based verified computation a few steps
closer to practicality
Srinath Setty, Victor Vu, Nikhil Panpalia,
Benjamin Braun, Andrew J. Blumberg, and Michael Walfish
21st USENIX Security Symposium
Security
2012, Bellevue, WA, August 2012. [pdf]
(revises and corrects conference version)
- TreeHouse: JavaScript sandboxes to help Web developers
help themselves
Lonni Ingram and Michael Walfish
USENIX Annual Technical Conference
USENIX
ATC 2012,
Boston, MA, June 2012. [pdf]
-
Making argument systems for outsourced computation practical
(sometimes)
Srinath Setty, Richard McPherson, Andrew J. Blumberg, and
Michael Walfish
19th Network and Distributed System Security
Symposium
NDSS 2012,
San Diego, CA, February 2012.
[pdf]
talk slides: [pdf
(12MB),
pptx
(673KB)]
-
Verifying and enforcing network paths with ICING
Jad Naous, Michael Walfish, Antonio Nicolosi,
David
Mazières, Michael Miller, and Arun Seehra
7th ACM International Conference on emerging Networking
EXperiments and Technologies
CoNEXT 2011,
Tokyo, Japan, December 2011.
[pdf]
- Depot: Cloud
storage with minimal trust
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen
Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish
ACM Transactions on Computer
Systems, Volume 29, Number 4, Article 12, December 2011.
[pdf]
-
The Web interface should be radically refactored
John Douceur, Jon Howell, Bryan Parno, Michael
Walfish, and Xi Xiong
10th ACM Workshop on Hot Topics in Networks
HotNets
2011
Cambridge, MA, November 2011.
[pdf]
- Detecting failures in distributed systems with the FALCON
spy network
Joshua B. Leners, Hao Wu, Wei-Lun Hung, Marcos K. Aguilera, and Michael Walfish
23rd ACM Symposium on Operating Systems Principles
SOSP 2011,
Cascais, Portugal, October 2011.
[pdf]
- Toward practical and unconditional verification of remote
computations
Srinath Setty, Andrew J. Blumberg, and Michael Walfish
13th Workshop on Hot Topics in Operating Systems
HotOS 2011,
Napa, CA, May 2011.
[pdf]
- Repair from a chair: Computer repair as an untrusted
cloud service
Lonni Ingram, Ivo Popov, Srinath Setty, and Michael Walfish
13th Workshop on Hot Topics in Operating Systems
HotOS 2011,
Napa, CA, May 2011.
[pdf]
- Depot: Cloud
storage with minimal trust
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen
Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish
9th USENIX Symposium on Operating Systems Design and
Implementation
OSDI 2010,
Vancouver, BC, Canada, October 2010.
[pdf]
Extended version:
UT CS Tech Report 10-33
- DDoS
Defense by Offense
Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David
Karger, and Scott Shenker
ACM Transactions on Computer
Systems, Volume 28, Number 1, Article 3, March 2010.
[pdf]
-
A
policy framework for the future Internet
Arun Seehra, Jad Naous, Michael Walfish, David Mazières, Antonio
Nicolosi, and Scott Shenker
8th ACM Workshop on Hot Topics in Networks
HotNets
2009, New York, NY, October 2009.
[pdf]
ppt talk slides
-
The
design and implementation of a policy framework for the
future Internet
Jad Naous, Arun Seehra, Michael Walfish, David Mazières, Antonio
Nicolosi, and Scott Shenker
Technical Report TR-09-28, Department of Computer Science, The
University of Texas at Austin, September 2009. [pdf]
-
No
Time for Asynchrony
Marcos K. Aguilera and Michael Walfish
12th Workshop on Hot Topics in Operating Systems
HotOS 2009,
Monte Verità, Switzerland, May 2009.
[pdf]
ppt
talk slides
-
A
World Wide Web Without Walls
Maxwell Krohn, Alex Yip, Micah Brodsky, Robert Morris, and Michael
Walfish
6th ACM Workshop on Hot Topics in Networks
HotNets 2007,
Atlanta, GA, November 2007.
[pdf,
ps,
ps.gz]
-
Defending
Networked Resources Against Floods of Unwelcome Requests
Michael Walfish
Ph.D. Dissertation, Massachusetts Institute of Technology, November 2007
[pdf]
-
DDoS
Defense by Offense
Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger,
and Scott Shenker
ACM SIGCOMM 2006,
Pisa, Italy, September 2006.
[pdf,
ps,
ps.gz]
pdf talk slides
-
Distributed
Quota Enforcement for Spam Control
Michael Walfish, J.D. Zamfirescu, Hari Balakrishnan,
David Karger, and Scott Shenker
3rd USENIX Symposium on Networked Systems Design and Implementation
NSDI 2006,
San Jose, CA, May 2006.
[pdf,
ps,
ps.gz,
html]
Supplement to the conference paper:
MIT CSAIL Tech Report
2006-033
pdf talk slides
-
DoS: Fighting Fire with Fire
Michael Walfish, Hari Balakrishnan, David Karger, and Scott Shenker
4th ACM Workshop on Hot Topics in Networks
HotNets 2005,
College Park, MD, November 2005.
[pdf,
ps,
ps.gz]
pdf talk slides
-
Peering Peer-to-Peer Providers
Hari Balakrishnan, Scott Shenker, and Michael Walfish
4th International Workshop on Peer-to-Peer Systems
IPTPS 2005,
Ithaca, NY, February 2005.
[pdf,
ps,
ps.gz]
ppt talk slides
-
Middleboxes No Longer Considered Harmful
Michael Walfish, Jeremy Stribling, Maxwell Krohn,
Hari Balakrishnan, Robert Morris, and Scott Shenker
6th USENIX Symposium on Operating Systems Design and Implementation
OSDI 2004,
San Francisco, CA, December 2004.
[pdf,
ps,
ps.gz]
ppt talk slides
-
A
Layered Naming Architecture for the Internet
Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy,
Scott Shenker, Ion Stoica, and Michael Walfish
ACM SIGCOMM 2004,
Portland, OR, September 2004.
[pdf,
ps,
ps.gz]
-
Untangling the
Web from DNS
Michael Walfish, Hari Balakrishnan, and Scott Shenker
1st USENIX/ACM Symposium on Networked Systems Design and Implementation
NSDI 2004,
San Francisco, CA, March 2004.
[pdf,
ps,
ps.gz]
ppt talk slides
-
Semantic-Free
Referencing in Linked Distributed Systems
Hari Balakrishnan, Scott Shenker, and Michael Walfish
2nd International Workshop on Peer-to-Peer Systems
IPTPS 2003,
Berkeley, CA, February 2003.
[pdf,
ps,
ps.gz]
The documents distributed by this server have been provided as a
means
to ensure timely dissemination of scholarly and technical work on a
noncommercial basis. Copyright and all rights therein are maintained
by the authors or by other copyright holders, notwithstanding that
the
works are offered here electronically. It is understood that all
persons copying this information will adhere to the terms and
constraints invoked by each author's copyright. These works may not
be
distributed without the explicit permission of the copyright holder.