Tal Garfinkel

ORCID: 0000-0003-4213-4755
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Advanced Data Storage Technologies
  • Cloud Data Security Solutions
  • Distributed systems and fault tolerance
  • Network Security and Intrusion Detection
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • Digital and Cyber Forensics
  • User Authentication and Security Systems
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Web Application Security Vulnerabilities
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Memory and Neural Computing
  • Gaze Tracking and Assistive Technology
  • Health, Environment, Cognitive Aging
  • Simulation Techniques and Applications
  • Collaboration in agile enterprises
  • Radiation Effects in Electronics
  • Network Traffic and Congestion Control
  • EEG and Brain-Computer Interfaces
  • Blockchain Technology Applications and Security
  • Digital Rights Management and Security

UC San Diego Health System
2025

University of California, San Diego
2024-2025

Stanford University
2003-2020

Kitware (United States)
2008-2014

Laboratoire d'Informatique de Paris-Nord
2003

We present a flexible architecture for trusted computing, called Terra, that allows applications with wide range of security requirements to run simultaneously on commodity hardware. Applications Terra enjoy the semantics running separate, dedicated, tamper-resistant hardware platform, while retaining ability side-by-side normal general-purpose computing platform. achieves this synthesis by use virtual machine monitor (TVMM) partitions platform into multiple, isolated machines (VM),...

10.1145/1165389.945464 article EN ACM SIGOPS Operating Systems Review 2003-10-19

Developed more than 30 years ago to address mainframe computing problems, virtual machine monitors have resurfaced on commodity platforms, offering novel solutions challenges in security, reliability, and administration. Stanford University researchers began look at the potential of machines overcome difficulties that hardware operating system limitations imposed: This time problems stemmed from massively parallel processing (MPP) were difficult program could not run existing systems. With...

10.1109/mc.2005.176 article EN Computer 2005-05-01

Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, consequently, frequently prone to compromise. To address this limitation, we introduce a virtual-machine-based system called Overshadow that protects the privacy integrity of application data, even in event total OScompromise. presents an normal view its resources, but OS encrypted view. This allows carry out complex task managing application's without allowing it read or modify them. Thus,...

10.1145/1346281.1346284 article EN 2008-03-01

We present a flexible architecture for trusted computing, called Terra, that allows applications with wide range of security requirements to run simultaneously on commodity hardware. Applications Terra enjoy the semantics running separate, dedicated, tamper-resistant hardware platform, while retaining ability side-by-side normal general-purpose computing platform. achieves this synthesis by use virtual machine monitor (TVMM) partitions platform into multiple, isolated machines (VM),...

10.1145/945445.945464 article EN 2003-10-19

Shoulder-surfing -- using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information is a problem that has been difficult overcome. When user enters keyboard, mouse, touch screen or any traditional input device, malicious observer may be able acquire the user's password credentials. We present EyePassword, system mitigates issues of shoulder surfing via novel approach input.

10.1145/1280680.1280683 article EN 2007-07-18

As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked design most today's operating systems, libraries, languages, etc. a result, applications are likely to leave they handle (passwords, financial military information, etc.) scattered widely over memory, leaked disk, left there for an indeterminate period time. This greatly increases impact system compromise.Dealing with issues is...

10.1145/1133572.1133599 article EN 2004-09-19

Virtualization is an important enabling technology for many large private datacenters and cloud computing environments. Virtual machines often have complex expectations of their runtime environment such as access to a particular network segment or storage system. Similarly, the may virtual machine's behavior compliance with control criteria limits on type quantity traffic generated by machine. Today, these diverse requirements are too specified, communicated managed non-portable, site...

10.1145/1555271.1555278 article EN 2009-06-19

We present a flexible architecture for trusted computing, called Terra, that allows applications with wide range of security requirements to run simultaneously on commodity hardware. Applications Terra enjoy the semantics running separate, dedicated, tamper-resistant hardware platform, while retaining ability side-by-side normal general-purpose computing platform. achieves this synthesis by use virtual machine monitor (TVMM) partitions platform into multiple, isolated machines (VM),...

10.1145/945461.945464 article EN 2003-01-01

We present Castor, a record/replay system for multi-core applications that provides consistently low and predictable overheads. With developers can leave record replay on by default, making it practical to reproduce production bugs, or employ fault tolerance recover from hardware failures.

10.1145/3037697.3037751 article EN 2017-04-04

WebAssembly (Wasm) is a low-level platform-independent bytecode language. Today, developers can compile C/C++ to Wasm and run it everywhere, at almost native speeds. Unfortunately, this compilation from also preserves classic memory safety vulnerabilities, such as buffer overflows use-after-frees.

10.1145/3337167.3337171 article EN 2019-06-23
Coming Soon ...