-
5
-
-
80052007811
-
Control-flow Integrity
-
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow Integrity. In: CCS 2005 (2005)
-
(2005)
CCS 2005
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
6
-
-
0003400255
-
Integrity Considerations for Secure Computer Systems
-
The Mitre Corporation
-
Biba, K.J.: Integrity Considerations for Secure Computer Systems. Tech. Rep. MTR-3153, The Mitre Corporation (1977)
-
(1977)
Tech. Rep. MTR-3153
-
-
Biba, K.J.1
-
7
-
-
72249091267
-
Fast Byte-granularity Software Fault Isolation
-
Castro, M., Costa, M., Martin, J.P., Peinado, M., Akritidis, P., Donnelly, A., Barham, P., Black, R.: Fast Byte-granularity Software Fault Isolation. In: SOSP 2009 (2009)
-
(2009)
SOSP 2009
-
-
Castro, M.1
Costa, M.2
Martin, J.P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
8
-
-
84976797486
-
Sharing and Protection in a Single-Address-Space Operating System
-
Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and Protection in a Single-Address-Space Operating System. ACM Trans. Comput. Syst. 12, 271-307 (1994)
-
(1994)
ACM Trans. Comput. Syst.
, vol.12
, pp. 271-307
-
-
Chase, J.S.1
Levy, H.M.2
Feeley, M.J.3
Lazowska, E.D.4
-
9
-
-
67650799825
-
Overshadow: A Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: a Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems. In: ASPLOS 2008 (2008)
-
(2008)
ASPLOS 2008
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
10
-
-
84944138173
-
Integrating Segmentation and Paging Protection for Safe, Efficient and Transparent Software Extensions
-
Chiueh, T.C., Venkitachalam, G., Pradhan, P.: Integrating Segmentation and Paging Protection for Safe, Efficient and Transparent Software Extensions. In: SOSP 1999 (1999)
-
(1999)
SOSP 1999
-
-
Chiueh, T.C.1
Venkitachalam, G.2
Pradhan, P.3
-
11
-
-
78649997202
-
Leveraging Legacy Code to Deploy Desktop Applications on the Web
-
Douceur, J.R., Elson, J., Howell, J., Lorch, J.R.: Leveraging Legacy Code to Deploy Desktop Applications on the Web. In: OSDI 2008 (2008)
-
(2008)
OSDI 2008
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
12
-
-
78651539599
-
XFI: Software Guards for System Address Spaces
-
Erlingsson, U., Abadi, M., Vrable, M., Budiu, M., Necula, G.C.: XFI: Software Guards for System Address Spaces. In: OSDI 2006 (2006)
-
(2006)
OSDI 2006
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
13
-
-
34748826163
-
Language Support for Fast and Reliable Message-based Communication in Singularity OS
-
Fähndrich, M., Aiken, M., Hawblitzel, C., Hodson, O., Hunt, G., Larus, J.R., Levi, S.: Language Support for Fast and Reliable Message-based Communication in Singularity OS. In: EuroSys 2006 (2006)
-
(2006)
EuroSys 2006
-
-
Fähndrich, M.1
Aiken, M.2
Hawblitzel, C.3
Hodson, O.4
Hunt, G.5
Larus, J.R.6
Levi, S.7
-
14
-
-
84858758065
-
Vx32: Lightweight User-level Sandboxing on the x86
-
Ford, B., Cox, R.: Vx32: Lightweight User-level Sandboxing on the x86. In: USENIX ATC (2008)
-
USENIX ATC (2008)
-
-
Ford, B.1
Cox, R.2
-
15
-
-
85180406262
-
Ostia: A Delegating Architecture for Secure System Call Interposition
-
Garfinkel, T., Pfaff, B., Rosenblum, M.: Ostia: A Delegating Architecture for Secure System Call Interposition. In: NDSS 2004 (2004)
-
(2004)
NDSS 2004
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
16
-
-
72249120603
-
seL4: Formal Verification of an OS Kernel
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal Verification of an OS Kernel. In: SOSP 2009 (2009)
-
(2009)
SOSP 2009
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
17
-
-
57749192483
-
Information Flow Control for Standard OS Abstractions
-
Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information Flow Control for Standard OS Abstractions. In: SOSP 2007 (2007)
-
(2007)
SOSP 2007
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
18
-
-
0002970064
-
On Micro-kernel Construction
-
Liedtke, J.: On Micro-kernel Construction. In: SOSP 1995 (1995)
-
(1995)
SOSP 1995
-
-
Liedtke, J.1
-
19
-
-
82655175538
-
Software fault isolation with API integrity and multi-principal modules
-
Mao, Y., Chen, H., Zhou, D., Wang, X., Zeldovich, N., Kaashoek, M.F.: Software fault isolation with API integrity and multi-principal modules. In: SOSP 2011 (2011)
-
(2011)
SOSP 2011
-
-
Mao, Y.1
Chen, H.2
Zhou, D.3
Wang, X.4
Zeldovich, N.5
Kaashoek, M.F.6
-
20
-
-
77955186544
-
TrustVisor: Efficient TCB Reduction and Attestation
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB Reduction and Attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy (2010)
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy (2010)
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
21
-
-
56549083677
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
22
-
-
70449824733
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In: SOSP 2007 (2007)
-
(2007)
SOSP 2007
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
24
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
ACM, New York
-
Sharif, M.I., Lee, W., Cui, W., Lanzi, A.: Secure in-vm monitoring using hardware virtualization. In: CCS 2009, pp. 477-487. ACM, New York (2009)
-
(2009)
CCS 2009
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
25
-
-
33646691869
-
Improving the Reliability of Commodity Operating Systems
-
Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commodity Operating Systems. In: SOSP 2003 (2003)
-
(2003)
SOSP 2003
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
26
-
-
85105238769
-
Efficient Software-based Fault Isolation
-
Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient Software-based Fault Isolation. In: SOSP 1993 (1993)
-
(1993)
SOSP 1993
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
27
-
-
77954608267
-
The Multi-principal OS Construction of the Gazelle Web Browser
-
Wang, H.J., Grier, C., Moshchuk, A., King, S.T., Choudhury, P., Venter, H.: The Multi-principal OS Construction of the Gazelle Web Browser. In: USENIX Security 2009 (2009)
-
(2009)
USENIX Security 2009
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
28
-
-
74049120743
-
Countering Kernel Rootkits with Lightweight Hook Protection
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering Kernel Rootkits with Lightweight Hook Protection. In: CCS 2009 (2009)
-
(2009)
CCS 2009
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
29
-
-
85067179564
-
Capsicum: Practical Capabilities for UNIX
-
Watson, R.N.M., Anderson, J., Laurie, B., Kennaway, K.: Capsicum: Practical Capabilities for UNIX. In: USENIX Security 2010 (2010)
-
(2010)
USENIX Security 2010
-
-
Watson, R.N.M.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
30
-
-
84885637591
-
Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection
-
Witchel, E., Rhee, J., Asanović, K.: Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection. In: SOSP 2005 (2005)
-
(2005)
SOSP 2005
-
-
Witchel, E.1
Rhee, J.2
Asanović, K.3
-
31
-
-
85093189156
-
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
-
Xiong, X., Tian, D., Liu., P.: Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. In: NDSS 2011 (2011)
-
(2011)
NDSS 2011
-
-
Xiong, X.1
Tian, D.2
Liu, P.3
-
32
-
-
69149106605
-
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
-
Yee, B., Sehr, D., Dardyk, G., Chen, J.B., Muth, R., Ormandy, T., Okasaka, S., Narula, N., Fullagar, N.: Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In: IEEE Symposium on Security and Privacy (2009)
-
IEEE Symposium on Security and Privacy (2009)
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
33
-
-
84888352157
-
Making Information Flow Explicit in HiStar
-
Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazières, D.: Making Information Flow Explicit in HiStar. In: OSDI 2006 (2006)
-
(2006)
OSDI 2006
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|