CONIKS: bringing key transparency to end users MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman 24th USENIX Security Symposium (USENIX Security 15), 383-398, 2015 | 362 | 2015 |
Shining the floodlights on mobile web tracking—a privacy survey C Eubank, M Melara, D Perez-Botero, A Narayanan IEEE Workshop on Web 2.0 Security & Privacy, 2013 | 37 | 2013 |
EnclaveDom: Privilege separation for large-TCB applications in trusted execution environments MS Melara, MJ Freedman, M Bowman arXiv preprint arXiv:1907.13245, 2019 | 34 | 2019 |
Optimizing deployment and security of microservices P Saxena, AL Vahldiek-Oberwagner, M Vij, KA Doshi, CH Morales, ... US Patent App. 17/561,676, 2022 | 9 | 2022 |
Pyronia: Redesigning Least Privilege and Isolation for the Age of IoT MS Melara, DH Liu, MJ Freedman arXiv preprint arXiv:1903.01950, 2019 | 7* | 2019 |
Vireos: An integrated, bottom-up, educational operating systems project with fpga support ML Corliss, M Melara Proceedings of the 42nd ACM technical symposium on Computer science …, 2011 | 6 | 2011 |
A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation? MS Melara, S Torres-Arias IEEE Security & Privacy 21 (6), 55-58, 2023 | 2 | 2023 |
Enabling Security-Oriented Orchestration of Microservices MS Melara, M Bowman arXiv preprint arXiv:2106.09841, 2021 | 2 | 2021 |
CONIKS: Preserving Secure Communication with Untrusted Identity Providers MS Melara Master's thesis, Princeton University, 2014 | 2 | 2014 |
SoK: A Defense-Oriented Evaluation of Software Supply Chain Security EA Ishgair, MS Melara, S Torres-Arias arXiv preprint arXiv:2405.14993, 2024 | 1 | 2024 |
SCORED'22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses S Torres-Arias, M Melara, L Simon Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 1 | 2022 |
Hardware-Enforced Integrity and Provenance for Distributed Code Deployments MS Melara, M Bowman NIST Workshop on Enhancing Software Supply Chain Security, 2021 | 1 | 2021 |
Mininet Clustering A Blankstein, S Erickson, M Melara COS 461 - Final Project Report, Princeton University, 2013 | 1 | 2013 |
Concept for Performing Operations on an Asset CM Bowman, PN Moorthy, B Vavala, MS Melara US Patent App. 18/343,797, 2024 | | 2024 |
SoK: A Defense-Oriented Evaluation of Software Supply Chain Security E Abu Ishgair, MS Melara, S Torres-Arias arXiv e-prints, arXiv: 2405.14993, 2024 | | 2024 |
Auditing the CI/CD Platform: Reproducible Builds vs. Hardware-Attested Build Environments, Which is Right for You? MS Melara, C Kimes Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research …, 2023 | | 2023 |
SCORED'23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses M Melara, S Torres-Arias, L Simon Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |
Method and apparatus for multi-dimensional attestation for a software application MS Melara, B Vavala, M Steiner, V Scarlata, AL Vahldiek-Oberwagner US Patent App. 18/311,253, 2023 | | 2023 |
Attestation of operations by tool chains V Scarlata, A Trivedi, R Lal, MS Melara, M Steiner, ... US Patent 11,650,800, 2023 | | 2023 |
Software Supply Chain Attribute Integrity (SCAI) MS Melara arXiv preprint arXiv:2210.05813, 2022 | | 2022 |