Bio


Mazieres investigates ways to improve the security of operating systems, file systems, and distributed systems. In addition, he has worked on large-scale peer-to-peer systems and e-mail privacy.

Academic Appointments


Honors & Awards


  • Alfred P. Sloan Research Fellow, Alfred P. Sloan Research Foundation (2002)
  • CAREER Award, National Science Foundation (2001)
  • MIT George R. Sprowls award for best thesis in computer science, Massachusetts Institute of Technology (2000)

Professional Education


  • PhD, MIT, Computer Science (2000)

2014-15 Courses


Journal Articles


  • Safe Haskell ACM SIGPLAN NOTICES Terei, D., Marlow, S., Jones, S. P., Mazieres, D. 2012; 47 (12): 137-148
  • Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems ACM SIGPLAN NOTICES Stefan, D., Russo, A., Buiras, P., Levy, A., Mitchell, J. C., Mazieres, D. 2012; 47 (9): 201-213
  • Disjunction Category Labels INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS Stefan, D., Russo, A., Mazieres, D., Mitchell, J. C. 2012; 7161: 223-239
  • Flexible Dynamic Information Flow Control in Haskell ACM SIGPLAN NOTICES Stefan, D., Russo, A., Mitchell, J. C., Mazieres, D. 2011; 46 (12): 95-106
  • Making Information Flow Explicit in HiStar COMMUNICATIONS OF THE ACM Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazieres, D. 2011; 54 (11): 93-101
  • The Case for RAMCloud COMMUNICATIONS OF THE ACM Ousterhout, J., Agrawal, P., Erickson, D., Kozyrakis, C., Leverich, J., Mazieres, D., Mitra, S., Narayanan, A., Ongaro, D., Parulkar, G., Rosenblum, M., Rumble, S. M., Stratmann, E., Stutsman, R. 2011; 54 (7): 121-130
  • Energy Management in Mobile Devices with the Cinder Operating System EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE Roy, A., Rumble, S. M., Stutsman, R., Levis, P., Mazieres, D., Zeldovich, N. 2011: 139-152
  • Making information flow explicit in HiStar. Communications of the ACM Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D. 2011; 11 (54): 93-101
  • Apprehending Joule Thieves with Cinder COMPUTER COMMUNICATION REVIEW Rumble, S. M., Stutsman, R., Levis, P., Mazieres, D., Zeldovich, N. 2010; 40 (1): 106-111
  • Defining and Enforcing Transit Policies in a Future Internet. Technical Report TR-10-07 Department of Computer Sciences, The University of Texas at Austin Naous, J., Seehra, A., Walfish, M., Mazières, D., Nicolosi, A., Shenker, S. 2010
  • Apprehending Joule Thieves with Cinder MOBIHELD 09 Rumble, S. M., Stutsman, R., Levis, P., Mazieres, D., Zeldovich, N. 2009: 49-54
  • Delegating Network Security with More Information WREN 2009 Naous, J., Stutsman, R., Mazieres, D., McKeown, N., Zeldovich, N. 2009: 19-26
  • Labels and event processes in the Asbestos operating system ACM TRANSACTIONS ON COMPUTER SYSTEMS Vandebogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Mazieres, D. 2007; 25 (4)
  • Making information flow explicit in HiStar USENIX ASSOCIATION 7TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazieres, D. 2006: 263-278
  • Blocking unwanted mail with mail avenger. Virus Bulletin Mazières, D. 2005: S2-S4
  • REX: Secure, modular remote execution through file descriptor passing. Technical Report MIT-LCSTR-884, MIT Laboratory for Computer Science Kaminsky, M., Peterson, E., Fu, K., Mazières, D., Kaashoek, M., Frans 2003
  • Multiprocessor support for event-driven programs USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK Zeldovich, N., Yip, A., Dabek, F., Morris, R. T., Mazieres, D., Kaashoek, F. 2003: 239-252
  • Using SFS for a secure network file system. In ;login: The Magazine of Usenix & Sage Fu, K., Kaminsky, M., Mazières, D. 2002; 6 (27): 6-16
  • Fast and secure distributed read-only file system. In ACM Transactions on Computer Systems Fu, K., Kaashoek, M., Frans, Mazières, D. 2002; 1 (20): 1-24
  • Self-certifying file system. PhD thesis, MIT Mazières, D. 2000
  • Security and Decentralized Control in the SFS Global File System. Master's thesis, MIT Mazières, D. 1997
  • The Measured Performance of Personal Computer Operating Systems. In ACM Transactions on Computer Systems Chen, J., Bradley, Endo, Y., Chan, K., Mazières, D., Dias, A., Smith, M. 1996; 1 (14): 3-40
  • Abstract execution in a multi-tasking environment. Technical Report TR-31-94. Harvard University Mazières, D., Smith, Michel, D. 1994

Conference Proceedings


  • Toward principled browser security. Yang, Edward, Z., Stefan, D., Mitchell, J., Mazières, D., Marchenko, P., Karp, B. 2013
  • Replication, History, and Grafting in the Ori File System. Mashtizadeh, A. J., Bittau, A., Huang, Y. F., Mazières, D. 2013
  • EyeQ: Practical network performance isolation at the edge. Jeyakumar, V., Alizadeh, M., Mazières, D., Prabhakar, B., Kim, C., Greenberg, A. 2013
  • Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. Stefan, D., Buiras, P., Yang, Edward, Z., Levy, A., Terei, D., Russo, A., Mazieres, D. 2013
  • Where is the debugger for my Software-Defined Network? Handigol, N., Heller, B., Jeyakumar, V., Mazières, D., McKeown, N. 2012
  • Hails: Protecting data privacy in untrusted web applications. Giffin, Daniel, B., Levy, A., Stefan, D., Terei, D., Mazières, D., Mitchell, J. 2012
  • Dune: Safe user-level access to privileged CPU features. Belay, A., Bittau, A., Mashtizadeh, A., Terei, D., Mazières, D., Kozyrakis, C. 2012
  • EyeQ: Practical Network Performance Isolation for the Multi-tenant Cloud. Jeyakumar, V., Alizadeh, M., Mazières, D., Prabhakar, B., Kim, C. 2012
  • Disjunction category labels. Stefan, D., Russo, A., Mazières, D., Mitchell, John, C. 2011
  • Verifying and enforcing network paths with ICING. Naous, J., Walfish, M., Nicolosi, A., Mazières, D., Miller, M., Seehra, A. 2011
  • The case for ubiquitous transport-level encryption. Bittau, A., Hamburg, M., Handley, M., Mazières, D., Boneh, D. 2010
  • Apprehending Joule Thieves with Cinder. Rumble, Stephen, M., Stutsman, R., Levis, P., Mazières, D., Zeldovich, N. 2009
  • A Policy Framework for the Future Internet. Seehra, A., Naous, J., Walfish, M., Mazières, D., Nicolosi, A., Shenker, S. 2009
  • Securing distributed systems with information flow control. Zeldovich, N., Boyd-Wickizer, S., Mazières, D. 2008
  • Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. Li, J., Mazières, D. 2007
  • RE: Reliable email. Garriss, S., Kaminsky, M., Freedman, Michael, J., Karp, B., Mazières, D., Yu, H. 2006
  • OASIS: Anycast for any service. Freedman, Michael, J., Lakshminarayanan, K., Mazières, D. 2006
  • Making information flow explicit in HiStar. Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D. 2006
  • Group therapy for systems: Using link attestations to manage failures. Freedman, Michael, J., Stoica, I., Mazières, D., Shenker, S. 2006
  • Labels and event processes in the Asbestos operating system. VanDeBogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Mazieres, D. 2005
  • Shark: Scaling file servers via cooperative caching. Annapureddy, S., Freedman, Michael, J., Mazières, D. 2005
  • Make Least Privilege a Right (Not a Privilege). Krohn, M., Efstathopoulos, P., Frey, C., Kaashoek, F., Kohler, E., Mazières, D. 2005
  • REX: Secure, extensible remote execution. Kaminsky, M., Peterson, E., Giffin, Daniel, B., Fu, K., Mazières, D., Kaashoek, M., Frans 2004
  • Secure Untrusted Data Repository (SUNDR). Li, J., Krohn, Maxwell, N., Mazières, D., Shasha, D. 2004
  • Secure acknowledgment of multicast messages in open peer-to-peer networks. Nicolosi, A., Mazières, D. 2004
  • On-the-fly verification of rateless erasure codes for efficient content distribution. Krohn, Maxwell, N., Freedman, Michael, J., Mazières, D. 2004
  • Democratizing content publication with Coral. Freedman, Michael, J., Freudenthal, E., Mazières, D. 2004
  • Sloppy hashing and self-organizing clusters. Freedman, M., Mazières, D. 2003
  • Rateless codes and big downloads. Maymounkov, P., Mazières, D. 2003
  • Decentralized user authentication in a global file system. Kaminsky, M., Savvides, G., Mazières, D., Kaashoek, M., Frans 2003
  • Proactive two-party signatures for user authentication. Nicolosi, A., Krohn, M., Dodis, Y., Mazières, D. 2003
  • Kademlia: A peer-to-peer information system based on the XOR metric. Maymounkov, P., Mazières, D. 2002
  • Event-driven programming for robust software. Dabek, F., Zeldovich, N., Kaashoek, M., Frans, Mazières, D., Morris, R. 2002
  • Building secure file systems out of Byzantine storage. Mazières, D., Shasha, D. 2002
  • Position Summary: Censorship Resistant Publishing Through Document Entanglements. Waldman, M., Mazières, D. 2001
  • Don't trust your file server. Mazières, D., Shasha, D. 2001
  • A toolkit for user-level file systems. Mazières, D. 2001
  • A low-bandwidth network file system. Muthitacharoen, A., Chen, B., Mazières, D. 2001
  • Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements. Waldman, M., Mazières, D. 2001
  • Fast and secure distributed read-only file system. Fu, K., Kaashoek, M., Frans, Mazières, D. 2000
  • A future-adaptable password scheme. Provos, N., Mazières, D. 1999
  • Separating key management from file system security. Mazières, D., Kaminsky, M., Kaashoek, M., Frans, Witchel, E. 1999
  • Escaping the evils of centralized control with self-certifying pathnames. Mazières, D., Kaashoek, M., Frans 1998
  • The design, implementation and operation of an email pseudonym server. Mazières, D., Kaashoek, M., Frans 1998
  • Application performance and flexibility on exokernel systems. Kaashoek, M., Frans, Engler, Dawson, R., Ganger, Gregory, R., Briceño, Héctor, M., Hunt, R., Mazières, D. 1997
  • Secure applications need flexible operating systems. Mazières, D., Kaashoek, M., Frans 1997
  • The Measured Performance of Personal Computer Operating Systems. Chen, J., Bradley, Endo, Y., Chan, K., Mazières, D., Dias, A., Smith, M. 1995