Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disaggregate Applications Along End-Host Data-Path., , , , , and . StudentWorkshop@CoNEXT, page 27-28. ACM, (2023)Cloud-Scale Runtime Verification of Serverless Applications., , , and . SoCC, page 92-107. ACM, (2021)Multitenancy for Fast and Programmable Networks in the Cloud., , , , , , and . HotCloud, USENIX Association, (2020)Kappa: a programming framework for serverless computing., , , and . SoCC, page 328-343. ACM, (2020)Blockaid: Data Access Policy Enforcement for Web Applications., , , , , and . OSDI, page 701-718. USENIX Association, (2022)Bertha: Tunneling through the Network API., , , , , and . HotNets, page 53-59. ACM, (2020)The case for an internet primitive for fault localization., , , , , , , and . HotNets, page 160-166. ACM, (2022)NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers., , , , , , and . ASPLOS (2), page 530-543. ACM, (2023)Access Control for Database Applications: Beyond Policy Enforcement., , and . HotOS, page 223-230. ACM, (2023)Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning., , , , , and . USENIX Security Symposium, page 2723-2740. USENIX Association, (2021)