| CONIKS: bringing key transparency to end users MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman 24th USENIX Security Symposium (USENIX Security 15), 383-398, 2015 | 417 | 2015 |
| EnclaveDom: Privilege separation for large-TCB applications in trusted execution environments MS Melara, MJ Freedman, M Bowman arXiv preprint arXiv:1907.13245, 2019 | 41 | 2019 |
| Shining the floodlights on mobile web tracking—a privacy survey C Eubank, M Melara, D Perez-Botero, A Narayanan IEEE Workshop on Web 2.0 Security & Privacy, 2013 | 39 | 2013 |
| Optimizing deployment and security of microservices P Saxena, AL Vahldiek-Oberwagner, M Vij, KA Doshi, CH Morales, ... US Patent App. 17/561,676, 2022 | 18 | 2022 |
| Atlas: A framework for ml lifecycle provenance & transparency M Spoczynski, MS Melara, S Szyller arXiv preprint arXiv:2502.19567, 2025 | 9 | 2025 |
| A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation? MS Melara, S Torres-Arias IEEE Security & Privacy 21 (6), 55-58, 2023 | 8 | 2023 |
| Pyronia: Redesigning Least Privilege and Isolation for the Age of IoT MS Melara, DH Liu, MJ Freedman arXiv preprint arXiv:1903.01950, 2019 | 8* | 2019 |
| SoK: A Defense-Oriented Evaluation of Software Supply Chain Security EA Ishgair, MS Melara, S Torres-Arias arXiv preprint arXiv:2405.14993, 2024 | 7 | 2024 |
| Attestation of operations by tool chains V Scarlata, A Trivedi, R Lal, MS Melara, M Steiner, ... US Patent 11,650,800, 2023 | 7 | 2023 |
| Vireos: An integrated, bottom-up, educational operating systems project with fpga support ML Corliss, M Melara Proceedings of the 42nd ACM technical symposium on Computer science …, 2011 | 6 | 2011 |
| Enabling Security-Oriented Orchestration of Microservices MS Melara, M Bowman arXiv preprint arXiv:2106.09841, 2021 | 2 | 2021 |
| Hardware-Enforced Integrity and Provenance for Distributed Code Deployments MS Melara, M Bowman NIST Workshop on Enhancing Software Supply Chain Security, 2021 | 2 | 2021 |
| CONIKS: Preserving Secure Communication with Untrusted Identity Providers MS Melara Master's thesis, Princeton University, 2014 | 2 | 2014 |
| SCORED'24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses S Torres-Arias, M Melara Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 1 | 2024 |
| Auditing the CI/CD Platform: Reproducible Builds vs. Hardware-Attested Build Environments, Which is Right for You? MS Melara, C Kimes Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research …, 2023 | 1 | 2023 |
| Intra-Process Least Privilege and Isolation for Emerging Applications MS Melara Princeton University, 2019 | 1 | 2019 |
| Mininet Clustering A Blankstein, S Erickson, M Melara COS 461 - Final Project Report, Princeton University, 2013 | 1 | 2013 |
| SCORED'25: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ASA Yelgundhalli, B Hassanshahi, D Roellke, D Davidson, K Moriarty, ... Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications …, 2025 | | 2025 |
| Scalable GPU-Based Integrity Verification for Large Machine Learning Models M Spoczynski, MS Melara arXiv preprint arXiv:2510.23938, 2025 | | 2025 |
| Trustworthy and Confidential SBOM Exchange EA Ishgair, C Okafor, MS Melara, S Torres-Arias arXiv preprint arXiv:2509.13217, 2025 | | 2025 |