Petros Maniatis
- Research Area(s)
- Mobile Systems
- Security, Privacy and Abuse Prevention
- Software Systems
Co-Authors
Google Publications
-
Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta
USENIX Security, USENIX (2016)
-
Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek
IEEE Transactions on Mobile Computing, vol. 14 (2015), pp. 2059-2072
-
The Performance Cost of Shadow Stacks and Stack Canaries
Thurston H.Y. Dang, Petros Maniatis, David Wagner
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), ACM (2015), pp. 555-566
Previous Publications
-
Making programs forget: Enforcing Lifetime for Sensitive Data
Jayanthkumar Kannan, Gautam Altekar, Petros Maniatis, Byung-Gon Chun
Proceedings of the 13th USENIX conference on Hot topics in operating systems, USENIX Association, Berkeley, CA, USA (2013)
-
Mantis: Automatic Performance Prediction for Smartphone Applications
Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek
USENIX Annual Technical Conference (2013), pp. 297-308
-
Symbolic software model validation
Cynthia Sturton, Rohit Sinha, Thurston H. Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David Wagner
MEMOCODE (2013), pp. 97-108
-
Towards verifiable resource accounting for outsourced computation
Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan, Vyas Sekar
VEE (2013), pp. 167-178
-
Path-exploration lifting: hi-fi tests for lo-fi emulators
Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, Petros Maniatis
ASPLOS (2012), pp. 337-348
-
Verification with small and short worlds
Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David Wagner
FMCAD (2012), pp. 68-77
-
CloneCloud: elastic execution between mobile device and cloud
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, Ashwin Patti
EuroSys (2011), pp. 301-314
-
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Petros Maniatis, Devdatta Akhawe, Kevin Fall, Elaine Shi, Dawn Song
HotOS (2011)
-
Secure Data Preservers for Web Services
Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun
Proceedings of the 2nd USENIX conference on Web Application Development, USENIX Association, Berkeley, CA, USA (2011)
-
Secure Data Preservers for Web Services
Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun
WebApps (2011)
-
Small trusted primitives for dependable systems
Petros Maniatis, Byung-Gon Chun
Operating Systems Review, vol. 45 (2011), pp. 126-141
-
Verifiable resource accounting for cloud computing services
Vyas Sekar, Petros Maniatis
CCSW (2011), pp. 21-26
-
A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users
Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun
CoRR, vol. abs/1002.0298 (2010)
-
CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik
CoRR, vol. abs/1009.3088 (2010)
-
Mantis: Predicting System Performance through Program Analysis and Modeling
Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik
CoRR, vol. abs/1010.0019 (2010)
-
Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression
Ling Huang, Jinzhu Jia, Bin Yu, Byung-Gon Chun, Petros Maniatis, Mayur Naik
NIPS (2010), pp. 883-891
-
Verifiable Network-Performance Measurements
Katerina J. Argyraki, Petros Maniatis, Ankit Singla
CoRR, vol. abs/1005.3148 (2010)
-
Verifiable network-performance measurements
Katerina J. Argyraki, Petros Maniatis, Ankit Singla
CoNEXT (2010), pp. 1
-
Augmented Smartphone Applications Through Clone Cloud Execution
Byung-Gon Chun, Petros Maniatis
HotOS (2009)
-
Declarative networking
Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica
Commun. ACM, vol. 52 (2009), pp. 87-95
-
Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks
Ramakrishna Gummadi, Hari Balakrishnan, Petros Maniatis, Sylvia Ratnasamy
NSDI (2009), pp. 307-320
-
Tiered Fault Tolerance for Long-Term Integrity
Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz
FAST (2009), pp. 267-282
-
Zeno: Eventually Consistent Byzantine-Fault Tolerance
Atul Singh, Pedro Fonseca 0001, Petr Kuznetsov, Rodrigo Rodrigues, Petros Maniatis
NSDI (2009), pp. 169-184
-
BFT Protocols Under Fire
Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, Timothy Roscoe
NSDI (2008), pp. 189-204
-
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
Byung-Gon Chun, Petros Maniatis, Scott Shenker
USENIX Annual Technical Conference (2008), pp. 287-292
-
Evita raced: metacompilation for declarative networks
Tyson Condie, David Chu, Joseph M. Hellerstein, Petros Maniatis
PVLDB, vol. 1 (2008), pp. 1153-1165
-
Attested append-only memory: making adversaries stick to their word
Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz
SOSP (2007), pp. 189-204
-
Friday: Global Comprehension for Distributed Replay
Dennis Geels, Gautam Altekar, Petros Maniatis, Timothy Roscoe, Ion Stoica
NSDI (2007)
-
Loss and Delay Accountability for the Internet
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S. Ashish, Scott Shenker
ICNP (2007), pp. 194-205
-
Proof Sketches: Verifiable In-Network Aggregation
Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis
ICDE (2007), pp. 996-1005
-
Public Health for the Internet (PHI)
Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft
CIDR (2007), pp. 332-340
-
A fresh look at the reliability of long-term digital storage
Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale
EuroSys (2006), pp. 221-234
-
Declarative networking: language, execution and optimization
Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica
SIGMOD Conference (2006), pp. 97-108
-
Induced Churn as Shelter from Routing-Table Poisoning
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis
NDSS (2006)
-
Using queries for distributed monitoring and forensics
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel
EuroSys (2006), pp. 389-402
-
A Fresh Look at the Reliability of Long-term Digital Storage
Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale
CoRR, vol. abs/cs/0508130 (2005)
-
Attrition Defenses for a Peer-to-Peer Digital Preservation System
Thomas J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos
USENIX Annual Technical Conference, General Track (2005), pp. 163-178
-
Implementing declarative overlays
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica
SOSP (2005), pp. 75-90
-
The Architecture of PIER: an Internet-Scale Query Processor
Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi
CIDR (2005), pp. 28-43
-
The LOCKSS peer-to-peer digital preservation system
Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker
ACM Trans. Comput. Syst., vol. 23 (2005), pp. 2-50
-
The Many Faces of Systems Research - and How to Evaluate Them
Aaron B. Brown, Anupam Chanda, Rik Farrow, Alexandra Fedorova, Petros Maniatis, Michael L. Scott
HotOS (2005)
-
2 P2P or Not 2 P2P?
Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul
IPTPS (2004), pp. 33-43
-
2 P2P or Not 2 P2P?
Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul
IPTPS (2004), pp. 33-43
-
Impeding attrition attacks in P2P systems
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker
ACM SIGOPS European Workshop (2004), pp. 12
-
Notes On The Design Of An Internet Adversary
David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, Mary Baker
CoRR, vol. cs.DL/0411078 (2004)
-
2 P2P or Not 2 P2P?
Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul
CoRR, vol. cs.NI/0311017 (2003)
-
2 P2P or Not 2 P2P?
Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul
CoRR, vol. cs.NI/0311017 (2003)
-
A Historic Name-Trail Service
Petros Maniatis, Mary Baker
WMCSA (2003), pp. 88-99
-
Authenticated Append-only Skip Lists
Petros Maniatis, Mary Baker
CoRR, vol. cs.CR/0302010 (2003)
-
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS
Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi
CoRR, vol. cs.DC/0303026 (2003)
-
Preserving peer replicas by rate-limited sampled voting
Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi
SOSP (2003), pp. 44-59
-
A Historic Name-Trail Service
Petros Maniatis, Mary Baker
CoRR, vol. cs.NI/0210019 (2002)
-
Enabling the Archival Storage of Signed Documents
Petros Maniatis, Mary Baker
FAST (2002), pp. 31-45
-
Peer-to-Peer Caching Schemes to Address Flash Crowds
Tyron Stading, Petros Maniatis, Mary Baker
IPTPS (2002), pp. 203-213
-
Secure History Preservation Through Timeline Entanglement
Petros Maniatis, Mary Baker
CoRR, vol. cs.DC/0202005 (2002)
-
Secure History Preservation Through Timeline Entanglement
Petros Maniatis, Mary Baker
USENIX Security Symposium (2002), pp. 297-312
-
Enabling the Long-Term Archival of Signed Documents through Time Stamping
Petros Maniatis, Thomas J. Giuli, Mary Baker
CoRR, vol. cs.DC/0106058 (2001)
-
Person-level Routing in the Mobile People Architecture
Mema Roussopoulos, Petros Maniatis, Edward Swierk, Kevin Lai, Guido Appenzeller, Mary Baker
USENIX Symposium on Internet Technologies and Systems (1999)
-
The mobile people architecture
Petros Maniatis, Mema Roussopoulos, Edward Swierk, Kevin Lai, Guido Appenzeller, Xinhua Zhao, Mary Baker
Mobile Computing and Communications Review, vol. 3 (1999), pp. 36-42



