Petros Maniatis

Petros Maniatis is a Staff Research Scientist at Google. Prior to that, he was a Senior Research Scientist at Intel Labs, working in Intel's Berkeley Research Lab and then at the Intel Science and Technology Center on Secure Computing at UC Berkeley. He received his MSc and Ph.D. from the Computer Science Department at Stanford University. Prior to Stanford, he obtained his BSc with honors at the Department of Informatics of the University of Athens in Greece. His research interests lie primarily in the confluence of distributed systems, security, and fault tolerance.

Google Publications

Previous Publications

  •  

    Making programs forget: Enforcing Lifetime for Sensitive Data

    Jayanthkumar Kannan, Gautam Altekar, Petros Maniatis, Byung-Gon Chun

    Proceedings of the 13th USENIX conference on Hot topics in operating systems, USENIX Association, Berkeley, CA, USA (2013)

  •  

    Mantis: Automatic Performance Prediction for Smartphone Applications

    Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek

    USENIX Annual Technical Conference (2013), pp. 297-308

  •  

    Symbolic software model validation

    Cynthia Sturton, Rohit Sinha, Thurston H. Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David Wagner

    MEMOCODE (2013), pp. 97-108

  •  

    Towards verifiable resource accounting for outsourced computation

    Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan, Vyas Sekar

    VEE (2013), pp. 167-178

  •  

    Path-exploration lifting: hi-fi tests for lo-fi emulators

    Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, Petros Maniatis

    ASPLOS (2012), pp. 337-348

  •  

    Verification with small and short worlds

    Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David Wagner

    FMCAD (2012), pp. 68-77

  •  

    CloneCloud: elastic execution between mobile device and cloud

    Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, Ashwin Patti

    EuroSys (2011), pp. 301-314

  •  

    Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection

    Petros Maniatis, Devdatta Akhawe, Kevin Fall, Elaine Shi, Dawn Song

    HotOS (2011)

  •  

    Secure Data Preservers for Web Services

    Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun

    Proceedings of the 2nd USENIX conference on Web Application Development, USENIX Association, Berkeley, CA, USA (2011)

  •  

    Secure Data Preservers for Web Services

    Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun

    WebApps (2011)

  •  

    Small trusted primitives for dependable systems

    Petros Maniatis, Byung-Gon Chun

    Operating Systems Review, vol. 45 (2011), pp. 126-141

  •  

    Verifiable resource accounting for cloud computing services

    Vyas Sekar, Petros Maniatis

    CCSW (2011), pp. 21-26

  •  

    A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users

    Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun

    CoRR, vol. abs/1002.0298 (2010)

  •  

    CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution

    Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik

    CoRR, vol. abs/1009.3088 (2010)

  •  

    Mantis: Predicting System Performance through Program Analysis and Modeling

    Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik

    CoRR, vol. abs/1010.0019 (2010)

  •  

    Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression

    Ling Huang, Jinzhu Jia, Bin Yu, Byung-Gon Chun, Petros Maniatis, Mayur Naik

    NIPS (2010), pp. 883-891

  •  

    Verifiable Network-Performance Measurements

    Katerina J. Argyraki, Petros Maniatis, Ankit Singla

    CoRR, vol. abs/1005.3148 (2010)

  •  

    Verifiable network-performance measurements

    Katerina J. Argyraki, Petros Maniatis, Ankit Singla

    CoNEXT (2010), pp. 1

  •  

    Augmented Smartphone Applications Through Clone Cloud Execution

    Byung-Gon Chun, Petros Maniatis

    HotOS (2009)

  •  

    Declarative networking

    Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica

    Commun. ACM, vol. 52 (2009), pp. 87-95

  •  

    Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks

    Ramakrishna Gummadi, Hari Balakrishnan, Petros Maniatis, Sylvia Ratnasamy

    NSDI (2009), pp. 307-320

  •  

    Tiered Fault Tolerance for Long-Term Integrity

    Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz

    FAST (2009), pp. 267-282

  •  

    Zeno: Eventually Consistent Byzantine-Fault Tolerance

    Atul Singh, Pedro Fonseca 0001, Petr Kuznetsov, Rodrigo Rodrigues, Petros Maniatis

    NSDI (2009), pp. 169-184

  •  

    BFT Protocols Under Fire

    Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, Timothy Roscoe

    NSDI (2008), pp. 189-204

  •  

    Diverse Replication for Single-Machine Byzantine-Fault Tolerance

    Byung-Gon Chun, Petros Maniatis, Scott Shenker

    USENIX Annual Technical Conference (2008), pp. 287-292

  •  

    Evita raced: metacompilation for declarative networks

    Tyson Condie, David Chu, Joseph M. Hellerstein, Petros Maniatis

    PVLDB, vol. 1 (2008), pp. 1153-1165

  •  

    Attested append-only memory: making adversaries stick to their word

    Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz

    SOSP (2007), pp. 189-204

  •  

    Friday: Global Comprehension for Distributed Replay

    Dennis Geels, Gautam Altekar, Petros Maniatis, Timothy Roscoe, Ion Stoica

    NSDI (2007)

  •  

    Loss and Delay Accountability for the Internet

    Katerina J. Argyraki, Petros Maniatis, O. Irzak, S. Ashish, Scott Shenker

    ICNP (2007), pp. 194-205

  •  

    Proof Sketches: Verifiable In-Network Aggregation

    Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis

    ICDE (2007), pp. 996-1005

  •  

    Public Health for the Internet (PHI)

    Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft

    CIDR (2007), pp. 332-340

  •  

    A fresh look at the reliability of long-term digital storage

    Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale

    EuroSys (2006), pp. 221-234

  •  

    Declarative networking: language, execution and optimization

    Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica

    SIGMOD Conference (2006), pp. 97-108

  •  

    Induced Churn as Shelter from Routing-Table Poisoning

    Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis

    NDSS (2006)

  •  

    Using queries for distributed monitoring and forensics

    Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel

    EuroSys (2006), pp. 389-402

  •  

    A Fresh Look at the Reliability of Long-term Digital Storage

    Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale

    CoRR, vol. abs/cs/0508130 (2005)

  •  

    Attrition Defenses for a Peer-to-Peer Digital Preservation System

    Thomas J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos

    USENIX Annual Technical Conference, General Track (2005), pp. 163-178

  •  

    Implementing declarative overlays

    Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica

    SOSP (2005), pp. 75-90

  •  

    The Architecture of PIER: an Internet-Scale Query Processor

    Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi

    CIDR (2005), pp. 28-43

  •  

    The LOCKSS peer-to-peer digital preservation system

    Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker

    ACM Trans. Comput. Syst., vol. 23 (2005), pp. 2-50

  •  

    The Many Faces of Systems Research - and How to Evaluate Them

    Aaron B. Brown, Anupam Chanda, Rik Farrow, Alexandra Fedorova, Petros Maniatis, Michael L. Scott

    HotOS (2005)

  •  

    2 P2P or Not 2 P2P?

    Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul

    IPTPS (2004), pp. 33-43

  •  

    2 P2P or Not 2 P2P?

    Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul

    IPTPS (2004), pp. 33-43

  •  

    Impeding attrition attacks in P2P systems

    Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker

    ACM SIGOPS European Workshop (2004), pp. 12

  •  

    Notes On The Design Of An Internet Adversary

    David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, Mary Baker

    CoRR, vol. cs.DL/0411078 (2004)

  •  

    2 P2P or Not 2 P2P?

    Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul

    CoRR, vol. cs.NI/0311017 (2003)

  •  

    2 P2P or Not 2 P2P?

    Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul

    CoRR, vol. cs.NI/0311017 (2003)

  •  

    A Historic Name-Trail Service

    Petros Maniatis, Mary Baker

    WMCSA (2003), pp. 88-99

  •  

    Authenticated Append-only Skip Lists

    Petros Maniatis, Mary Baker

    CoRR, vol. cs.CR/0302010 (2003)

  •  

    Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS

    Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi

    CoRR, vol. cs.DC/0303026 (2003)

  •  

    Preserving peer replicas by rate-limited sampled voting

    Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi

    SOSP (2003), pp. 44-59

  •  

    A Historic Name-Trail Service

    Petros Maniatis, Mary Baker

    CoRR, vol. cs.NI/0210019 (2002)

  •  

    Enabling the Archival Storage of Signed Documents

    Petros Maniatis, Mary Baker

    FAST (2002), pp. 31-45

  •  

    Peer-to-Peer Caching Schemes to Address Flash Crowds

    Tyron Stading, Petros Maniatis, Mary Baker

    IPTPS (2002), pp. 203-213

  •  

    Secure History Preservation Through Timeline Entanglement

    Petros Maniatis, Mary Baker

    CoRR, vol. cs.DC/0202005 (2002)

  •  

    Secure History Preservation Through Timeline Entanglement

    Petros Maniatis, Mary Baker

    USENIX Security Symposium (2002), pp. 297-312

  •  

    Enabling the Long-Term Archival of Signed Documents through Time Stamping

    Petros Maniatis, Thomas J. Giuli, Mary Baker

    CoRR, vol. cs.DC/0106058 (2001)

  •  

    Person-level Routing in the Mobile People Architecture

    Mema Roussopoulos, Petros Maniatis, Edward Swierk, Kevin Lai, Guido Appenzeller, Mary Baker

    USENIX Symposium on Internet Technologies and Systems (1999)

  •  

    The mobile people architecture

    Petros Maniatis, Mema Roussopoulos, Edward Swierk, Kevin Lai, Guido Appenzeller, Xinhua Zhao, Mary Baker

    Mobile Computing and Communications Review, vol. 3 (1999), pp. 36-42