User profiles for Matthew Lentz
Matthew LentzAssistant Professor, Duke University Verified email at cs.duke.edu Cited by 300 |
Secloak: Arm trustzone-based mobile peripheral control
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
Remote procedure call as a managed system service
Remote Procedure Call (RPC) is a widely used abstraction for cloud computing. The programmer
specifies type information for each remote procedure, and a compiler generates stub …
specifies type information for each remote procedure, and a compiler generates stub …
Dissecting overheads of service mesh sidecars
Service meshes play a central role in the modern application ecosystem by providing an easy
and flexible way to connect microservices of a distributed application. However, because …
and flexible way to connect microservices of a distributed application. However, because …
Dissecting service mesh overheads
Service meshes play a central role in the modern application ecosystem by providing an easy
and flexible way to connect different services that form a distributed application. However, …
and flexible way to connect different services that form a distributed application. However, …
Serving and optimizing machine learning workflows on heterogeneous infrastructures
With the advent of ubiquitous deployment of smart devices and the Internet of Things, data
sources for machine learning inference have increasingly moved to the edge of the network. …
sources for machine learning inference have increasingly moved to the edge of the network. …
Encore: Private, context-based communication for mobile social apps
Mobile social apps provide sharing and networking opportunities based on a user's location,
activity, and set of nearby users. A platform for these apps must meet a wide range of …
activity, and set of nearby users. A platform for these apps must meet a wide range of …
Brave new world: Privacy risks for mobile users
…, P Druschel, V Erdélyi, M Lentz - Proceedings of the …, 2014 - dl.acm.org
Sophisticated mobile computing, sensing and recording devices are commonplace. Smart
phones have achieved significant penetration and novel devices like Google Glass are …
phones have achieved significant penetration and novel devices like Google Glass are …
{SDDR}:{Light-Weight}, Secure Mobile Encounters
Emerging mobile social apps use short-range radios to discover nearby devices and users.
The device discovery protocol used by these apps must be highly energy-efficient since it …
The device discovery protocol used by these apps must be highly energy-efficient since it …
Drowsy power management
Portable computing devices have fast multi-core processors, large memories, and many on-board
sensors and radio interfaces, but are often limited by their energy consumption. …
sensors and radio interfaces, but are often limited by their energy consumption. …
[PDF][PDF] DrSec: Flexible Distributed Representations for Efficient Endpoint Security
The increasing complexity of attacks has given rise to varied security applications tackling
profound tasks, ranging from alert triage to attack reconstruction. Yet, security products, such …
profound tasks, ranging from alert triage to attack reconstruction. Yet, security products, such …