-
2
-
-
84860588970
-
-
W&X. http://en.wikipedia.org/wiki/W&X.
-
W&X
-
-
-
3
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
November
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security (November 2005).
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
October
-
AZAB, A. M., NING, P., WANG, Z., JIANG, X., ZHANG, X., AND SKALSKY, N. C. HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity. In Proceedings of the 17th ACM Conference on Computer and Communications Security (October 2010).
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
October
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T. L., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (October 2003).
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
85076921347
-
The turtles project: Design and implementation of nested virtualization
-
October
-
BEN-YEHUDA, M., DAY, M. D., DUBITZKY, Z., FACTOR, M., HAREL, N., GORDON, A., LIGUORI, A., WASSERMAN, O., AND YASSOUR, B.-A. The Turtles Project: Design and Implementation of Nested Virtualization. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (October 2010).
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation
-
-
Ben-Yehuda, M.1
Day, M.D.2
Dubitzky, Z.3
Factor, M.4
Harel, N.5
Gordon, A.6
Liguori, A.7
Wasserman, O.8
Yassour, B.-A.9
-
8
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
October
-
BUCHANAN, E., ROEMER, R., SHACHAM, H., AND SAVAGE, S. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC. In Proceedings of the 15th ACM Conference on Computer and Communications Security (October 2008).
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
10
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
October
-
COLP, P., NANAVATI, M., ZHU, J., AIELLO, W., COKER, G., DEEGAN, T., LOSCOCCO, P., AND WARFIELD, A. Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (October 2011).
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
13
-
-
78651539599
-
XFI: Software guards for system address spaces
-
November
-
ERLINGSSON, U., VALLEY, S., ABADI, M., VRABLE, M., BUDIU, M., AND NECULA, G. C. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (November 2006).
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
-
-
Erlingsson, U.1
Valley, S.2
Abadi, M.3
Vrable, M.4
Budiu, M.5
Necula, G.C.6
-
15
-
-
77957808684
-
The design and implementation of microdrivers
-
March
-
GANAPATHY, V., RENZELMANN, M. J., BALAKRISHNAN, A., SWIFT, M. M., AND JHA, S. The Design and Implementation of Microdrivers. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (March 2008).
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
19
-
-
54049158076
-
Kvm: The linux virtual machine monitor
-
June
-
KIVITY, A., KAMAY, Y., LAOR, D., LUBLIN, U., AND LIGUORI, A. kvm: the Linux Virtual Machine Monitor. In Proceedings of the 2007 Ottawa Linux Symposium (June 2007).
-
(2007)
Proceedings of the 2007 Ottawa Linux Symposium
-
-
Kivity, A.1
Kamay, Y.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
20
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
October
-
KLEIN, G., ELPHINSTONE, K., HEISER, G., ANDRONICK, J., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., AND WINWOOD, S. seL4: Formal Verification of an OS Kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (October 2009).
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating Systems Principles
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
22
-
-
82655175538
-
Software fault isolation with API integrity and multi-principal modules
-
October
-
MAO, Y., CHEN, H., ZHOU, D., WANG, X., ZELDOVICH, N., AND KAASHOEK, M. F. Software Fault Isolation with API Integrity and Multi-principal Modules. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (October 2011).
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles
-
-
Mao, Y.1
Chen, H.2
Zhou, D.3
Wang, X.4
Zeldovich, N.5
Kaashoek, M.F.6
-
26
-
-
77954589264
-
Virtual machines jailed: Virtualization in systems with small trusted computing bases
-
March
-
PETER, M., SCHILD, H., LACKORZYNSKI, A., AND WARG, A. Virtual Machines Jailed: Virtualization in Systems with Small Trusted Computing Bases. In Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems (March 2009).
-
(2009)
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems
-
-
Peter, M.1
Schild, H.2
Lackorzynski, A.3
Warg, A.4
-
29
-
-
70349112366
-
Virtio: Towards a de-facto standard for virtual I/O devices
-
RUSSELL, R. Virtio: Towards a De-facto Standard for Virtual I/O Devices. ACM SIGOPS Operating Systems Review 42, 5 (2008).
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.5
-
-
Russell, R.1
-
31
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
November
-
SHARIF, M., LEE, W., CUI, W., AND LANZI, A. Secure In-VM Monitoring Using Hardware Virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security (November 2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
33
-
-
84870455720
-
-
STANDARD PERFORMANCE EVALUATION CORPORATION. SPEC CPU2006. http://www.spec.org/cpu2006.
-
SPEC CPU2006
-
-
-
36
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
October
-
SZEFER, J., KELLER, E., LEE, R. B., AND REXFORD, J. Eliminating the Hypervisor Attack Surface for a More Secure Cloud. In Proceedings of the 18th ACM Conference on Computer and Communications Security (October 2011).
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
38
-
-
0027836576
-
Efficient software-based fault isolation
-
December
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. Efficient Software-based Fault Isolation. In Proceedings of the 14th ACM Symposium On Operating System Principles (December 1993).
-
(1993)
Proceedings of the 14th ACM Symposium on Operating System Principles
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
40
-
-
85067179564
-
Capsicum: Practical capabilities for UNIX
-
August
-
WATSON, R. N. M., ANDERSON, J., LAURIE, B., AND KENNAWAY, K. Capsicum: Practical Capabilities for UNIX. In Proceedings of the 19th USENIX Security Symposium (August 2010).
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Watson, R.N.M.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
41
-
-
85076907815
-
Device driver safety through a reference validation mechanism
-
December
-
WILLIAMS, D., REYNOLDS, P., WALSH, K., SIRER, E. G., AND SCHNEIDER, F. B. Device Driver Safety through a Reference Validation Mechanism. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (December 2008).
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation
-
-
Williams, D.1
Reynolds, P.2
Walsh, K.3
Sirer, E.G.4
Schneider, F.B.5
-
43
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
May
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J. B., MUTH, R., ORM, T., OKASAKA, S., NARULA, N., FULLAGAR, N., AND INC, G. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In Proceedings of the 30th IEEE Symposium on Security and Privacy (May 2009).
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Orm, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
Inc, G.10
|