Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tal Garfinkel is active.

Publication


Featured researches published by Tal Garfinkel.


IEEE Computer | 2005

Virtual machine monitors: current technology and future trends

Mendel Rosenblum; Tal Garfinkel

Developed more than 30 years ago to address mainframe computing problems, virtual machine monitors have resurfaced on commodity platforms, offering novel solutions to challenges in security, reliability, and administration. Stanford University researchers began to look at the potential of virtual machines to overcome difficulties that hardware and operating system limitations imposed: This time the problems stemmed from massively parallel processing (MPP) machines that were difficult to program and could not run existing operating systems. With virtual machines, researchers found they could make these unwieldy architectures look sufficiently similar to existing platforms to leverage the current operating systems. From this project came the people and ideas that underpinned VMware Inc., the original supplier of VMMs for commodity computing hardware. The implications of having a VMM for commodity platforms intrigued both researchers and entrepreneurs.


symposium on usable privacy and security | 2007

Reducing shoulder-surfing by using gaze-based password entry

Manu Kumar; Tal Garfinkel; Dan Boneh; Terry Winograd

Shoulder-surfing -- using direct observation techniques, such as looking over someones shoulder, to get passwords, PINs and other sensitive personal information -- is a problem that has been difficult to overcome. When a user enters information using a keyboard, mouse, touch screen or any traditional input device, a malicious observer may be able to acquire the users password credentials. We present EyePassword, a system that mitigates the issues of shoulder surfing via a novel approach to user input. With EyePassword, a user enters sensitive input (password, PIN, etc.) by selecting from an on-screen keyboard using only the orientation of their pupils (i.e. the position of their gaze on screen), making eavesdropping by a malicious observer largely impractical. We present a number of design choices and discuss their effect on usability and security. We conducted user studies to evaluate the speed, accuracy and user acceptance of our approach. Our results demonstrate that gaze-based password entry requires marginal additional time over using a keyboard, error rates are similar to those of using a keyboard and subjects preferred the gaze-based password entry approach over traditional methods.


workshop on automated control for datacenters and clouds | 2009

Virtual machine contracts for datacenter and cloud computing environments

Jeanna Neefe Matthews; Tal Garfinkel; Christofer Hoff; Jeffrey Wheeler

Virtualization is an important enabling technology for many large private datacenters and cloud computing environments. Virtual machines often have complex expectations of their runtime environment such as access to a particular network segment or storage system. Similarly, the runtime environment may have complex expectations of a virtual machines behavior such as compliance with network access control criteria or limits on the type and quantity of network traffic generated by the virtual machine. Today, these diverse requirements are too often specified, communicated and managed with non-portable, site specific, loosely coupled, and out-of-band processes. We propose Virtual Machine Contracts (VMCs), a platform independent way of automating the communication and management of such requirements. We describe how VMCs can be expressed through additions to the Open Virtual Machine Format (OVF) standard and how they can be managed in a uniform way even across environments with heterogeneous elements for enforcement. We explore use cases for this approach and argue that it is an essential step towards automated control and management of virtual machines in large datacenters and cloud computing environments.


acm sigops european workshop | 2004

Data lifetime is a systems problem

Tal Garfinkel; Ben Pfaff; Jim Chow; Mendel Rosenblum

As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked in the design of most of todays operating systems, libraries, languages, etc. As a result, applications are likely to leave the sensitive data they handle (passwords, financial and military information, etc.) scattered widely over memory, leaked to disk, etc. and left there for an indeterminate period of time. This greatly increases the impact of a system compromise.Dealing with data lifetime issues is currently left to application developers, who largely overlook them. Security-aware developers who attempt to address them (e.g. cryptographic library writers) are stymied by the limitations of the operating systems, languages, etc. they rely on. We argue that data lifetime is a systems issue which must be recognized and addressed at all layers of the software stack.


architectural support for programming languages and operating systems | 2017

Towards Practical Default-On Multi-Core Record/Replay

Ali José Mashtizadeh; Tal Garfinkel; David Terei; David Mazières; Mendel Rosenblum

We present Castor, a record/replay system for multi-core applications that provides consistently low and predictable overheads. With Castor, developers can leave record and replay on by default, making it practical to record and reproduce production bugs, or employ fault tolerance to recover from hardware failures. Castor is inspired by several observations: First, an efficient mechanism for logging non-deterministic events is critical for recording demanding workloads with low overhead. Through careful use of hardware we were able to increase log throughput by 10x or more, e.g., we could record a server handling 10x more requests per second for the same record overhead. Second, most applications can be recorded without modifying source code by using the compiler to instrument language level sources of non-determinism, in conjunction with more familiar techniques like shared library interposition. Third, while Castor cannot deterministically replay all data races, this limitation is generally unimportant in practice, contrary to what prior work has assumed. Castor currently supports applications written in C, C++, and Go on FreeBSD. We have evaluated Castor on parallel and server workloads, including a commercial implementation of memcached in Go, which runs Castor in production.


network and distributed system security symposium | 2003

A Virtual Machine Introspection Based Architecture for Intrusion Detection.

Tal Garfinkel; Mendel Rosenblum


symposium on operating systems principles | 2003

Terra: a virtual machine-based platform for trusted computing

Tal Garfinkel; Ben Pfaff; Jim Chow; Mendel Rosenblum; Dan Boneh


architectural support for programming languages and operating systems | 2008

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems

Xiaoxin Chen; Tal Garfinkel; E. Christopher Lewis; Pratap Subrahmanyam; Carl A. Waldspurger; Dan Boneh; Jeffrey S. Dwoskin; Dan R. K. Ports


usenix security symposium | 2006

SANE: a protection architecture for enterprise networks

Martin Casado; Tal Garfinkel; Aditya Akella; Michael J. Freedman; Dan Boneh; Nick McKeown; Scott Shenker


usenix security symposium | 2004

Understanding data lifetime via whole system simulation

Jim Chow; Ben Pfaff; Tal Garfinkel; Kevin Christopher; Mendel Rosenblum

Collaboration


Dive into the Tal Garfinkel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge