User profiles for Matthew Lentz

Matthew Lentz

Assistant Professor, Duke University
Verified email at cs.duke.edu
Cited by 300

Secloak: Arm trustzone-based mobile peripheral control

M Lentz, R Sen, P Druschel… - Proceedings of the 16th …, 2018 - dl.acm.org
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …

Remote procedure call as a managed system service

…, S Lin, Y Xu, X Kong, T Anderson, M Lentz… - … USENIX Symposium on …, 2023 - usenix.org
Remote Procedure Call (RPC) is a widely used abstraction for cloud computing. The programmer
specifies type information for each remote procedure, and a compiler generates stub …

Dissecting overheads of service mesh sidecars

…, XC Duan, P He, A Krishnamurthy, M Lentz… - Proceedings of the …, 2023 - dl.acm.org
Service meshes play a central role in the modern application ecosystem by providing an easy
and flexible way to connect microservices of a distributed application. However, because …

Dissecting service mesh overheads

…, X Duan, P He, A Krishnamurthy, M Lentz… - arXiv preprint arXiv …, 2022 - arxiv.org
Service meshes play a central role in the modern application ecosystem by providing an easy
and flexible way to connect different services that form a distributed application. However, …

Serving and optimizing machine learning workflows on heterogeneous infrastructures

Y Wu, M Lentz, D Zhuo, Y Lu - arXiv preprint arXiv:2205.04713, 2022 - arxiv.org
With the advent of ubiquitous deployment of smart devices and the Internet of Things, data
sources for machine learning inference have increasingly moved to the edge of the network. …

Encore: Private, context-based communication for mobile social apps

P Aditya, V Erdélyi, M Lentz, E Shi… - Proceedings of the 12th …, 2014 - dl.acm.org
Mobile social apps provide sharing and networking opportunities based on a user's location,
activity, and set of nearby users. A platform for these apps must meet a wide range of …

Brave new world: Privacy risks for mobile users

…, P Druschel, V Erdélyi, M Lentz - Proceedings of the …, 2014 - dl.acm.org
Sophisticated mobile computing, sensing and recording devices are commonplace. Smart
phones have achieved significant penetration and novel devices like Google Glass are …

{SDDR}:{Light-Weight}, Secure Mobile Encounters

M Lentz, V Erdélyi, P Aditya, E Shi, P Druschel… - 23rd USENIX Security …, 2014 - usenix.org
Emerging mobile social apps use short-range radios to discover nearby devices and users.
The device discovery protocol used by these apps must be highly energy-efficient since it …

Drowsy power management

M Lentz, J Litton, B Bhattacharjee - … of the 25th Symposium on Operating …, 2015 - dl.acm.org
Portable computing devices have fast multi-core processors, large memories, and many on-board
sensors and radio interfaces, but are often limited by their energy consumption. …

[PDF][PDF] DrSec: Flexible Distributed Representations for Efficient Endpoint Security

…, K Westfall, A Bates, V Ganti, M Lentz… - … IEEE Symposium on …, 2024 - users.cs.duke.edu
The increasing complexity of attacks has given rise to varied security applications tackling
profound tasks, ranging from alert triage to attack reconstruction. Yet, security products, such …