-
1
-
-
0004200684
-
-
Technical report, HQ Electronic Systems Division (AFSC), Oct., ESDTR-73-51
-
J. P. Anderson. Computer security technology planning study. Technical report, HQ Electronic Systems Division (AFSC), Oct. 1972. ESDTR-73-51.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
2
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
Cascais, Portugal, Oct
-
J. Andrus, C. Dall, A. Van't Hof, O. Laadan, and J. Nieh. Cells: A virtual mobile smartphone architecture. In Proceedings of the 23rd ACM Symposium on Operating System Principles, Cascais, Portugal, Oct. 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating System Principles
-
-
Andrus, J.1
Dall, C.2
Van't Hof, A.3
Laadan, O.4
Nieh, J.5
-
3
-
-
0002757750
-
Keying hash functions for message authentication
-
Santa Barbara, CA, Aug
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, Aug. 1996.
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
80054992065
-
Extensibility safety and performance in the spin operating system
-
Dec
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility safety and performance in the SPIN operating system. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, Copper Mountain, CO, Dec. 1995.
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles, Copper Mountain, CO
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
5
-
-
0024772234
-
Kit: A study in operating system verification
-
W. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15:1382-1396, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, pp. 1382-1396
-
-
Bevier, W.1
-
6
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
Oct
-
M. Castro, M. Costa, J.-P. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black. Fast byte-granularity software fault isolation. In Proceedings of the 22nd ACM Symposium on Operating System Principles, Big Sky, MT, Oct. 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating System Principles, Big Sky, MT
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
8
-
-
70349325391
-
Vcc: A practical system for verifying concurrent c
-
Aug
-
E. Cohen, M. Dahlweid, M. Hillebrand, D. Leinenbach, M. Moskal, T. Santen, W. Schulte, and S. Tobies. VCC: A practical system for verifying concurrent C. In Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics, Munich, Germany, Aug. 2009.
-
(2009)
Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics, Munich, Germany
-
-
Cohen, E.1
Dahlweid, M.2
Hillebrand, M.3
Leinenbach, D.4
Moskal, M.5
Santen, T.6
Schulte, W.7
Tobies, S.8
-
10
-
-
33751067472
-
A safetyoriented platform for web applications
-
May
-
R. S. Cox, S. D. Gribble, H. M. Levy, and J. G. Hansen. A safetyoriented platform for web applications. In Proceedings of the 27th IEEE Symposium on Security and Privacy, Oakland, CA, May 2006.
-
(2006)
Proceedings of the 27th IEEE Symposium on Security and Privacy, Oakland, CA
-
-
Cox, R.S.1
Gribble, S.D.2
Levy, H.M.3
Hansen, J.G.4
-
11
-
-
41149167181
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
Oct
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: a safe execution environment for commodity operating systems. In Proceedings of the 21st ACM Symposium on Operating System Principles, Stevenson, WA, Oct. 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating System Principles, Stevenson, WA
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
13
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Oct
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, Canada, Oct. 2010.
-
(2010)
Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, Canada
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
15
-
-
85084163985
-
The jx operating system
-
June
-
M. Golm, M. Felser, C. Wawersich, and J. Kleinöder. The JX operating system. In Proceedings of the USENIX 2002 Annual Technical Conference, Monterey, CA, June 2002.
-
(2002)
Proceedings of the USENIX 2002 Annual Technical Conference, Monterey, CA
-
-
Golm, M.1
Felser, M.2
Wawersich, C.3
Kleinöder, J.4
-
17
-
-
38349068551
-
Singularity: Rethinking the software stack
-
Apr
-
G. C. Hunt and J. R. Larus. Singularity: rethinking the software stack. ACM SIGOPS Operating Systems Review, 41(2):37-49, Apr. 2007.
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, Issue.2
, pp. 37-49
-
-
Hunt, G.C.1
Larus, J.R.2
-
20
-
-
72249120603
-
Sel4: Formal verification of an os kernel
-
Oct
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In Proceedings of the 22nd ACM Symposium on Operating System Principles, Big Sky, MT, Oct. 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating System Principles, Big Sky, MT
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
21
-
-
80755143400
-
L4android: A generic operating system framework for secure smartphones
-
Oct
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter. L4Android: a generic operating system framework for secure smartphones. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile devices, Chicago, IL, Oct. 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
22
-
-
80052526498
-
Dafny: An automatic program verifier for functional correctness
-
Apr
-
K. R. M. Leino. Dafny: an automatic program verifier for functional correctness. In Proceedings of 16th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, Dakar, Senegal, Apr. 2010.
-
(2010)
Proceedings of 16th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, Dakar, Senegal
-
-
Leino, K.R.M.1
-
24
-
-
84857151947
-
Recursive proofs for inductive tree data-structures
-
Jan
-
P. Madhusudan, X. Qiu, and A. Stefanescu. Recursive proofs for inductive tree data-structures. In Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Philadelphia, PA, Jan. 2012.
-
(2012)
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Philadelphia, PA
-
-
Madhusudan, P.1
Qiu, X.2
Stefanescu, A.3
-
26
-
-
61949206859
-
An overview of the kernelized secure operating system (ksos)
-
Sept
-
T. Perrine, J. Codd, and B. Hardy. An overview of the kernelized secure operating system (KSOS). In Proceedings of the 7th DoD/NBS Computer Security Initiative Conference, Gaithersburg, MD, Sept. 1984.
-
(1984)
Proceedings of the 7th DoD/NBS Computer Security Initiative Conference, Gaithersburg, MD
-
-
Perrine, T.1
Codd, J.2
Hardy, B.3
-
27
-
-
84875651486
-
-
Unpublished manuscript
-
X. Qiu, P. Garg, A. Stefanescu, and P. Madhusudan. Natural proofs for structure, data, and separation. Unpublished manuscript, 2012.
-
(2012)
Natural Proofs for Structure, Data, and Separation
-
-
Qiu, X.1
Garg, P.2
Stefanescu, A.3
Madhusudan, P.4
-
28
-
-
0001421170
-
Eros: A fast capability system
-
Dec
-
J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: a fast capability system. In Proceedings of the 17th ACM Symposium on Operating System Principles, Charleston, SC, Dec. 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating System Principles, Charleston, SC
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
29
-
-
82655182920
-
Logical attestation: An authorization architecture for trustworthy computing
-
Oct
-
E. G. Sirer, W. de Bruijn, P. Reynolds, A. Shieh, K. Walsh, D.Williams, and F. B. Schneider. Logical attestation: an authorization architecture for trustworthy computing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal, Oct. 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal
-
-
Sirer, E.G.1
De Bruijn, W.2
Reynolds, P.3
Shieh, A.4
Walsh, K.5
Williams, D.6
Schneider, F.B.7
-
30
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
Oct
-
M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
32
-
-
84857516359
-
Trust and protection in the illinois browser operating system
-
Oct
-
S. Tang, H. Mai, and S. T. King. Trust and protection in the Illinois browser operating system. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, Canada, Oct. 2010.
-
(2010)
Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, Canada
-
-
Tang, S.1
Mai, H.2
King, S.T.3
-
33
-
-
80052533055
-
Crafting a usable microkernel, processor, and i/o system with strict and provable information flow security
-
June
-
M. Tiwari, J. K. Oberg, X. Li, J. Valamehr, T. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. In Proceedings of 38th International Symposium on Computer Architecture, San Jose, CA, June 2011.
-
(2011)
Proceedings of 38th International Symposium on Computer Architecture, San Jose, CA
-
-
Tiwari, M.1
Oberg, J.K.2
Li, X.3
Valamehr, J.4
Levin, T.5
Hardekopf, B.6
Kastner, R.7
Chong, F.T.8
Sherwood, T.9
-
34
-
-
33846519994
-
Types, bytes, and separation logic
-
Jan
-
H. Tuch, G. Klein, and M. Norrish. Types, bytes, and separation logic. In Proceedings of the 34th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Nice, France, Jan. 2007.
-
(2007)
Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Nice, France
-
-
Tuch, H.1
Klein, G.2
Norrish, M.3
-
35
-
-
0027836576
-
Efficient software-based fault isolation
-
Dec
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the 14th ACM symposium on Operating Systems Principles, Asheville, NC, Dec. 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles, Asheville, NC
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
36
-
-
0018983212
-
Specification and verification of the ucla unix security kernel
-
Feb
-
B. J. Walker, R. A. Kemmerer, and G. J. Popek. Specification and verification of the UCLA Unix security kernel. Communications of the ACM, 23(2):118-131, Feb. 1980.
-
(1980)
Communications of the ACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
-
37
-
-
84978438355
-
Scale and performance in the denali isolation kernel
-
Dec
-
A. Whitaker, M. Shaw, and S. D. Gribble. Scale and performance in the Denali isolation kernel. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, Dec. 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.D.3
-
39
-
-
0012579128
-
-
Technical report, Columbia University, June, CUCS-021-98
-
E. Zadok, I. Badulescu, and A. Shender. Cryptfs: A stackable vnode level encryption file system. Technical report, Columbia University, June 1998. CUCS-021-98.
-
(1998)
Cryptfs: A Stackable Vnode Level Encryption File System
-
-
Zadok, E.1
Badulescu, I.2
Shender, A.3
-
40
-
-
84888352157
-
Making information flow explicit in histar
-
Nov
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, Nov. 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|