Manuel Costa mostly deals with Overhead, Computer security, Software, Exploit and Static analysis. His studies in Overhead integrate themes in fields like Object and Backward compatibility. He combines subjects such as Blocking, Block, Host and Containment with his study of Computer security.
Exploit and The Internet are frequently intertwined in his study. His Static analysis research incorporates elements of Graph, Computer engineering and Memory corruption. His Operating system study integrates concerns from other disciplines, such as Data integrity, Correctness and Code.
Computer network, Computer security, Distributed computing, Exploit and Code are his primary areas of study. The concepts of his Computer network study are interwoven with issues in Decoding methods and State. His Computer security research incorporates themes from Software, The Internet, Dataflow and Containment.
His The Internet study combines topics in areas such as End-to-end principle, Host and Source code. His work in Distributed computing covers topics such as Overlay which are related to areas like Flooding. His Exploit course of study focuses on Static analysis and Memory corruption, Graph and Computer engineering.
Manuel Costa spends much of his time researching Code, Computer security, Computer network, Confidentiality and Cloud computing. The study incorporates disciplines such as Machine learning, Data integrity, Secure multi-party computation and Operating system in addition to Code. His Data integrity research includes themes of Overhead, Protocol, Application programming interface and Component.
His Computer security research is multidisciplinary, relying on both Data center and Data processing. He works on Computer network which deals in particular with Encryption. His studies deal with areas such as Synchronization, Transaction log, Server and Cryptography as well as Cloud computing.
Manuel Costa focuses on Cloud computing, Code, Encryption, Distributed computing and Embedded system. His Cloud computing research integrates issues from Trusted Computing, Data integrity and Correctness. The various areas that he examines in his Code study include Cryptographic protocol, Computer network, Node, Overhead and Blockchain.
His work carried out in the field of Encryption brings together such families of science as Adversary, Information sensitivity, Information privacy and Traffic analysis. His study looks at the intersection of Distributed computing and topics like Secure communication with Trusted computing base. His Embedded system study incorporates themes from Runtime verification, Compiler and MESI protocol, Cache algorithms, Cache coloring.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Vigilante: end-to-end containment of internet worms
Manuel Costa;Jon Crowcroft;Miguel Castro;Antony Rowstron.
symposium on operating systems principles (2005)
VC3: Trustworthy Data Analytics in the Cloud Using SGX
Felix Schuster;Manuel Costa;Cedric Fournet;Christos Gkantsidis.
ieee symposium on security and privacy (2015)
PIC: practical Internet coordinates for distance estimation
M. Costa;M. Castro;R. Rowstron;P. Key.
international conference on distributed computing systems (2004)
Securing software by enforcing data-flow integrity
Miguel Castro;Manuel Costa;Tim Harris.
operating systems design and implementation (2006)
Oblivious multi-party machine learning on trusted processors
Olga Ohrimenko;Felix Schuster;Cédric Fournet;Aastha Mehta.
usenix security symposium (2016)
Preventing Memory Error Exploits with WIT
P. Akritidis;C. Cadar;C. Raiciu;M. Costa.
ieee symposium on security and privacy (2008)
Containment of worms
Manuel Costa;Miguel Castro;Antony Rowstron;Jon Crowcroft.
Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors
Periklis Akritidis;Manuel Costa;Miguel Castro;Steven Hand.
usenix security symposium (2009)
Performance and dependability of structured peer-to-peer overlays
M. Castro;M. Costa;A. Rowstron.
dependable systems and networks (2004)
Fast byte-granularity software fault isolation
Miguel Castro;Manuel Costa;Jean-Philippe Martin;Marcus Peinado.
symposium on operating systems principles (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: