-
1
-
-
34247885571
-
Intel Virtualization Technology for directed I/O
-
August
-
D. Abramson, J. Jackson, S. Muthrasanallur, G. Neiger, G. Regnier, R. Sankaran, I. Schoinas, R. Uhlig, B. Vembu, and J. Weigert. Intel Virtualization Technology for directed I/O. Intel Technology Journal, 10(3):179-192, August 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 179-192
-
-
Abramson, D.1
Jackson, J.2
Muthrasanallur, S.3
Neiger, G.4
Regnier, G.5
Sankaran, R.6
Schoinas, I.7
Uhlig, R.8
Vembu, B.9
Weigert, J.10
-
2
-
-
0003400251
-
-
Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March
-
D. E. Bell and L. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
LaPadula, L.2
-
4
-
-
0007986382
-
The KeyKOS nanokernel architecture
-
April
-
A. C. Bomberger, A. P. Frantz, W. S. Frantz, A. C. Hardy, N. Hardy, C. R. Landau, and J. S. Shapiro. The KeyKOS nanokernel architecture. In Proc. of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, April 1992.
-
(1992)
Proc. Of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures
-
-
Bomberger, A.C.1
Frantz, A.P.2
Frantz, W.S.3
Hardy, A.C.4
Hardy, N.5
Landau, C.R.6
Shapiro, J.S.7
-
5
-
-
85084162287
-
Setuid demystified
-
San Francisco, CA, August
-
H. Chen, D. Wagner, and D. Dean. Setuid demystified. In Proc. of the 11th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
Proc. Of the 11th USENIX Security Symposium
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
6
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
Yokohama, Japan, June
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In Proc. of the International Conference on Dependable Systems and Networks, Yokohama, Japan, June 2005.
-
(2005)
Proc. Of the International Conference on Dependable Systems and Networks
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
7
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Seattle, WA, March
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In Proc. of the 13th ASPLOS, Seattle, WA, March 2008.
-
(2008)
Proc. Of the 13th ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
9
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
San Diego, CA, June
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In Proc. of the 34th ISCA, San Diego, CA, June 2007.
-
(2007)
Proc. Of the 34th ISCA
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
10
-
-
33845414042
-
Labels and event processes in the Asbestos operating system
-
Brighton, UK, October
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proc. of the 20th SOSP, pages 17-30, Brighton, UK, October 2005.
-
(2005)
Proc. Of the 20th SOSP
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
12
-
-
33745212805
-
An overview of the Singularity project
-
Microsoft, Redmond, WA, October
-
G. C. Hunt, J. R. Larus, M. Abadi, M. Aiken, P. Barham, M. Fahndrich, C. Hawblitzel, O. Hod-son, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. Zill. An overview of the Singularity project. Technical Report MSR-TR-2005-135, Microsoft, Redmond, WA, October 2005.
-
(2005)
Technical Report MSR-TR-2005-135
-
-
Hunt, G.C.1
Larus, J.R.2
Abadi, M.3
Aiken, M.4
Barham, P.5
Fahndrich, M.6
Hawblitzel, C.7
Hod-Son, O.8
Levi, S.9
Murphy, N.10
Steensgaard, B.11
Tarditi, D.12
Wobber, T.13
Zill, B.14
-
13
-
-
85080661327
-
-
IBM Corporation. IBM system i. http://www-03.ibm.com/systems/i.
-
IBM System I
-
-
-
14
-
-
33746900101
-
-
Intel Corporation. Intel i960 processors. http://developer.intel.com/design/i960/.
-
Intel I960 Processors
-
-
-
15
-
-
0025137215
-
A VMM security kernel for the VAX architecture
-
Oakland, CA, May
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A VMM security kernel for the VAX architecture. In Proc. of the 1990 IEEE Symposium on Security and Privacy, pages 2-19, Oakland, CA, May 1990.
-
(1990)
Proc. Of the 1990 IEEE Symposium on Security and Privacy
, pp. 2-19
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
16
-
-
85069221251
-
-
Technical Report University of Washington, Department of Computer Science and Engineering, March
-
E. Koldinger, J. Chase, and S. Eggers. Architectural support for single address space operating systems. Technical Report 92-03-10, University of Washington, Department of Computer Science and Engineering, March 1992.
-
(1992)
Architectural Support for Single Address Space Operating Systems
-
-
Koldinger, E.1
Chase, J.2
Eggers, S.3
-
17
-
-
33845403940
-
Building secure high-performance web services with OKWS
-
June-July
-
M. Krohn. Building secure high-performance web services with OKWS. In Proc. of the 2004 USENIX, June-July 2004.
-
(2004)
Proc. Of the 2004 USENIX
-
-
Krohn, M.1
-
18
-
-
57749192483
-
Information flow control for standard OS abstractions
-
Stevenson, WA, October
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In Proc. of the 21st SOSP, Stevenson, WA, October 2007.
-
(2007)
Proc. Of the 21st SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
19
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. P. Wobber. Authentication in distributed systems: Theory and practice. ACM TOCS, 10(4):265-310, 1992.
-
(1992)
ACM TOCS
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.P.4
-
21
-
-
77649281635
-
How low can you go? Recommendations for hardware-supported minimal TCB code execution
-
Seattle, WA, March
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. How low can you go? Recommendations for hardware-supported minimal TCB code execution. In Proc. of the 13th ASPLOS, Seattle, WA, March 2008.
-
(2008)
Proc. Of the 13th ASPLOS
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
22
-
-
33645766952
-
-
PITAC. February
-
President's Information Technology Advisory Committee (PITAC). Cybersecurity: A crisis of prioritization. http://www.nitrd.gov/pitac/reports/20050301 cybersecurity/cybersecurity.pdf, February 2005.
-
(2005)
Cybersecurity: A Crisis of Prioritization
-
-
-
23
-
-
85041481084
-
Design and verification of secure systems
-
Pacific Grove, CA, December
-
J. M. Rushby. Design and verification of secure systems. In Proc. of the 8th SOSP, pages 12-21, Pacific Grove, CA, December 1981.
-
(1981)
Proc. Of the 8th SOSP
, pp. 12-21
-
-
Rushby, J.M.1
-
25
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
M. D. Schroeder and J. H. Saltzer. A hardware architecture for implementing protection rings. Comm. of the ACM, 15(3):157-170, 1972.
-
(1972)
Comm. Of the ACM
, vol.15
, Issue.3
, pp. 157-170
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
26
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
October
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proc. of the 21st SOSP, pages 335-350, October 2007.
-
(2007)
Proc. Of the 21st SOSP
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
28
-
-
33748870010
-
Infoshield: A security architecture for protecting information usage in memory
-
Austin, TX, February
-
W. Shi, H.-H. Lee, G. Gu, L. Falk, T. Mudge, and M. Ghosh. InfoShield: A security architecture for protecting information usage in memory. In Proc. of the 12th HPCA, Austin, TX, February 2006.
-
(2006)
Proc. Of the 12th HPCA
-
-
Shi, W.1
Lee, H.-H.2
Gu, G.3
Falk, L.4
Mudge, T.5
Ghosh, M.6
-
29
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Boston, MA, October
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. of the 11th ASPLOS, Boston, MA, October 2004.
-
(2004)
Proc. Of the 11th ASPLOS
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
30
-
-
16644400693
-
Improving the reliability of commodity operating systems
-
M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. ACM TOCS, 23(1), 2005.
-
(2005)
ACM TOCS
, vol.23
, Issue.1
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
31
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
Seattle, WA, November
-
R. Ta-Min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In Proc. of the 7th OSDI, pages 279-292, Seattle, WA, November 2006.
-
(2006)
Proc. Of the 7th OSDI
, pp. 279-292
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
32
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
Portland, OR, December
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for user-centric information-flow security. In Proc. of the 37th International Symposium on Microarchitecture, Portland, OR, December 2004.
-
(2004)
Proc. Of the 37th International Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
33
-
-
0036957412
-
Mondrian memory protection
-
San Jose, CA, October
-
E. Witchel, J. Cates, and K. Asanovic. Mondrian memory protection. In Proc. of the 10th ASPLOS, San Jose, CA, October 2002.
-
(2002)
Proc. Of the 10th ASPLOS
-
-
Witchel, E.1
Cates, J.2
Asanovic, K.3
-
34
-
-
33845435188
-
Mondrix: Memory isolation for linux using mondriaan memory protection
-
October
-
E. Witchel, J. Rhee, and K. Asanovic. Mondrix: Memory isolation for linux using mondriaan memory protection. In Proc. of the 20th SOSP, pages 31-44, October 2005.
-
(2005)
Proc. Of the 20th SOSP
, pp. 31-44
-
-
Witchel, E.1
Rhee, J.2
Asanovic, K.3
-
35
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA, November
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proc. of the 7th OSDI, pages 263-278, Seattle, WA, November 2006.
-
(2006)
Proc. Of the 7th OSDI
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
36
-
-
85094632142
-
Securing distributed systems with information flow control
-
San Francisco, CA, April
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In Proc. of the 5th NSDI, pages 293-308, San Francisco, CA, April 2008.
-
(2008)
Proc. Of the 5th NSDI
, pp. 293-308
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
|