-
2
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In ACM Computer and Communications Security Conf., 2005.
-
(2005)
ACM Computer and Communications Security Conf
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
3
-
-
0033686981
-
A semantic model of types and machine instructions for proof-carrying code
-
A. W. Appel and A. P. Felty. A semantic model of types and machine instructions for proof-carrying code. In POPL, 2000.
-
(2000)
POPL
-
-
Appel, A.W.1
Felty, A.P.2
-
4
-
-
4444265683
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP, 2003.
-
(2003)
SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, safety and performance in the SPIN operating system. In SOSP, 1995.
-
(1995)
SOSP
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Becker, D.5
Fiuczynski, M.6
Chambers, C.7
Eggers, S.8
-
6
-
-
0029231618
-
Protection is a software issue
-
B. N. Bershad, S. Savage, P. Pardyak, D. Becker, M. Fiuczynski, and E. G. Sirer. Protection is a software issue. In HotOS, 1995.
-
(1995)
HotOS
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Becker, D.4
Fiuczynski, M.5
Sirer, E.G.6
-
10
-
-
26444599305
-
Enforcing resource bounds via static verification of dynamic checks
-
A. Chander, D. Espinosa, N. Islam, P. Lee, and G. C. Necula. Enforcing resource bounds via static verification of dynamic checks. In European Symp. on Programming, 2005.
-
(2005)
European Symp. On Programming
-
-
Chander, A.1
Espinosa, D.2
Islam, N.3
Lee, P.4
Necula, G.C.5
-
11
-
-
85076736230
-
A framework for certified program analysis and its applications to mobile-code safety
-
B.-Y. E. Chang, A. Chlipala, and G. C. Necula. A framework for certified program analysis and its applications to mobile-code safety. In International Conf. on Verification, Model Checking, and Abstract Interpretation, 2006.
-
(2006)
International Conf. On Verification, Model Checking, and Abstract Interpretation
-
-
Chang, B.-Y.E.1
Chlipala, A.2
Necula, G.C.3
-
12
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. Iyer. Non-control-data attacks are realistic threats. In Usenix Security, 2005.
-
(2005)
Usenix Security
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.5
-
13
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Usenix Security, 1998.
-
(1998)
Usenix Security
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
14
-
-
0012612903
-
-
U.T. Austin, Dept. of C.S
-
R. Desikan, D. C. Burger, S. W. Keckler, and T. Austin. Simalpha: a validated, execution-driven Alpha 21264 simulator. Technical Report TR-01-23, U.T. Austin, Dept. of C.S., 2003.
-
(2003)
Simalpha: A Validated, Execution-Driven Alpha 21264 Simulator. Technical Report TR-01-23
-
-
Desikan, R.1
Burger, D.C.2
Keckler, S.W.3
Austin, T.4
-
19
-
-
33745212805
-
An overview of the Singularity project
-
Microsoft Research
-
G. C. Hunt, J. R. Larus, M. Abadi, M. Aiken, P. Barham, M. Fahndrich, C. Hawblitzel, O. Hodson, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. Zill. An overview of the Singularity project. Technical Report MSR-TR-2005-135, Microsoft Research, 2005.
-
(2005)
Technical Report MSR-TR-2005-135
-
-
Hunt, G.C.1
Larus, J.R.2
Abadi, M.3
Aiken, M.4
Barham, P.5
Fahndrich, M.6
Hawblitzel, C.7
Hodson, O.8
Levi, S.9
Murphy, N.10
Steensgaard, B.11
Tarditi, D.12
Wobber, T.13
Zill, B.14
-
22
-
-
0031339427
-
MediaBench: A tool for evaluating and synthesizing multimedia and communications systems
-
C. Lee, M. Potkonjak, and W. H. Mangione-Smith. MediaBench: a tool for evaluating and synthesizing multimedia and communications systems. In MICRO, 1997.
-
(1997)
MICRO
-
-
Lee, C.1
Potkonjak, M.2
Mangione-Smith, W.H.3
-
23
-
-
84867853619
-
Unmodified device driver reuse and improved system dependability via virtual machines
-
J. LeVasseur, V. Uhlig, J. Stoess, and S. Götz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI, 2004.
-
(2004)
OSDI
-
-
LeVasseur, J.1
Uhlig, V.2
Stoess, J.3
Götz, S.4
-
27
-
-
85028466841
-
The packet filter: An efficient mechanism for user-level network code
-
J. Mogul, R. Rashid, and M. Accetta. The packet filter: An efficient mechanism for user-level network code. ACM Operating Systems Review, SIGOPS, 21(5), 1987.
-
(1987)
ACM Operating Systems Review, SIGOPS
, vol.21
, Issue.5
-
-
Mogul, J.1
Rashid, R.2
Accetta, M.3
-
29
-
-
0030685617
-
Proof-carrying code
-
G. C. Necula. Proof-carrying code. In POPL, 1997.
-
(1997)
POPL
-
-
Necula, G.C.1
-
31
-
-
33646408973
-
A crash course on the depths of Win32 structured exception handling
-
M. Pietrek. A crash course on the depths of Win32 structured exception handling. Microsoft Systems Journal, 1997. http://www.microsoft.com/msj/0197/.
-
(1997)
Microsoft Systems Journal
-
-
Pietrek, M.1
-
32
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4), 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
-
-
Pincus, J.1
Baker, B.2
-
33
-
-
34547423144
-
Locating system problems using dynamic instrumentation
-
V. Prasad, W. Cohen, F. C. Eigler, M. Hunt, J. Keniston, and B. Chen. Locating system problems using dynamic instrumentation. In Ottawa Linux Symp., 2005.
-
(2005)
Ottawa Linux Symp
-
-
Prasad, V.1
Cohen, W.2
Eigler, F.C.3
Hunt, M.4
Keniston, J.5
Chen, B.6
-
35
-
-
85076720086
-
Some issues in the design of extensible operating systems
-
S. Savage and B. N. Bershad. Some issues in the design of extensible operating systems. In OSDI, 1994.
-
(1994)
OSDI
-
-
Savage, S.1
Bershad, B.N.2
-
39
-
-
33646691869
-
Improving the reliability of commodity operating systems
-
M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In SOSP, 2003.
-
(2003)
SOSP
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
40
-
-
11144253525
-
Capriccio: Scalable threads for Internet services
-
R. von Behren, J. Condit, F. Zhou, G. C. Necula, and E. Brewer. Capriccio: Scalable threads for Internet services. In SOSP, 2003.
-
(2003)
SOSP
-
-
Von Behren, R.1
Condit, J.2
Zhou, F.3
Necula, G.C.4
Brewer, E.5
-
42
-
-
85092930606
-
Hardware works, software doesn’t: Enforcing modularity with Mondriaan memory protection
-
E. Witchel and K. Asanovic. Hardware works, software doesn’t: Enforcing modularity with Mondriaan memory protection. In HotOS, 2003.
-
(2003)
HotOS
-
-
Witchel, E.1
Asanovic, K.2
-
44
-
-
84885637591
-
Mondrix: Memory isolation for Linux using Mondriaan memory protection
-
E. Witchel, J. Rhee, and K. Asanović. Mondrix: Memory isolation for Linux using Mondriaan memory protection. In SOSP, 2005.
-
(2005)
SOSP
-
-
Witchel, E.1
Rhee, J.2
Asanović, K.3
|