-
1
-
-
0027836576
-
Efficient software-based fault isolation
-
Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review 27 (1993) 203-216
-
(1993)
ACM SIGOPS Operating Systems Review
, vol.27
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
2
-
-
0032116284
-
MiSFIT: Constructing safe extensible systems
-
Small, C., Seltzer, M.I.: MiSFIT: Constructing safe extensible systems. IEEE Concurrency 6 (1998) 34-41
-
(1998)
IEEE Concurrency
, vol.6
, pp. 34-41
-
-
Small, C.1
Seltzer, M.I.2
-
3
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
Caledon Hills, Ontario, Canada, ACM SIGSAC, ACM Press
-
Úlfar Erlingsson, Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: New Security Paradigms Workshop, Caledon Hills, Ontario, Canada, ACM SIGSAC, ACM Press (1999) 87-95
-
(1999)
New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, Ú.1
Schneider, F.B.2
-
5
-
-
33745640145
-
Efficient, verifiable binary sandboxing for a CISC architecture
-
MIT LCS
-
McCamant, S., Morrisett, G.: Efficient, verifiable binary sandboxing for a CISC architecture. Technical report, MIT LCS (2005)
-
(2005)
Technical Report
-
-
McCamant, S.1
Morrisett, G.2
-
6
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
Vigna, G., ed.: Mobile Agents and Security Springer-Verlag, Berlin Germany
-
Necula, G.C., Lee, P.: Safe, untrusted agents using proof-carrying code. In Vigna, G., ed.: Mobile Agents and Security. Volume 1419 of Lecture Notes in Computer Science., Springer-Verlag, Berlin Germany (1998) 61-91
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
9
-
-
0030651295
-
Achieved IPC performance (still the foundation for extensibility)
-
Cape Cod, MA, USA
-
Liedtke, J., Elphinstone, K., Schönberg, S., Härtig, H., Heiser, G., Islam, N., Jaeger, T.: Achieved IPC performance (still the foundation for extensibility). In: Proc. 6th HotOS, Cape Cod, MA, USA (1997) 28-31
-
(1997)
Proc. 6th HotOS
, pp. 28-31
-
-
Liedtke, J.1
Elphinstone, K.2
Schönberg, S.3
Härtig, H.4
Heiser, G.5
Islam, N.6
Jaeger, T.7
-
10
-
-
0032667877
-
Flexible policy-directed code safety
-
Oakland, CA, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
Evans, D., Twyman, A.: Flexible policy-directed code safety. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press (1999) 32-45
-
(1999)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 32-45
-
-
Evans, D.1
Twyman, A.2
-
11
-
-
80052007811
-
Control-flow integrity
-
Microsoft Research
-
Abadi, M., Budiu, M., Úlfar Erlingsson, Ligatti, J.: Control-flow integrity. Technical Report MSR-TR-05-18, Microsoft Research (2005)
-
(2005)
Technical Report
, vol.MSR-TR-05-18
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
12
-
-
33745790748
-
A theory of secure control flow
-
Microsoft Research
-
Abadi, M., Budiu, M., Úlfar Erlingsson, Ligatti, J.: A theory of secure control flow. Technical Report MSR-TR-05-17, Microsoft Research (2005)
-
(2005)
Technical Report
, vol.MSR-TR-05-17
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
13
-
-
0004349103
-
Vulcan: Binary transformation in a distributed environment
-
Microsoft Research
-
Srivastava, A., Edwards, A., Vo, H.: Vulcan: Binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, Microsoft Research (2001)
-
(2001)
Technical Report
, vol.MSR-TR-2001-50
-
-
Srivastava, A.1
Edwards, A.2
Vo, H.3
|