-
1
-
-
51849104627
-
ARM TrustZone: Integrated hardware and software security
-
July
-
T. Alves and D. Felton, "ARM TrustZone: Integrated hardware and software security," Information Quarterly, vol. 3, no. 4, July 2004.
-
(2004)
Information Quarterly
, vol.3
, Issue.4
-
-
Alves, T.1
Felton, D.2
-
2
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
New York, NY, USA: ACM
-
T. M. Austin, S. E. Breach, and G. S. Sohi, "Efficient detection of all pointer and array access errors," in Proceedings of the ACM SIGPlAN 1994 conference on Programming language design and implementation, ser. PLDl ' 94. New York, NY, USA: ACM, 1994, pp. 290-301.
-
(1994)
Proceedings of the ACM SIGPlAN 1994 Conference on Programming Language Design and Implementation, Ser. PLDl ' 94
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
3
-
-
84875859350
-
Dune: Safe user-level access to privileged CPU features
-
A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D. Mazieres, and C. Kozyrakis, "Dune: safe user-level access to privileged CPU features;' in Proceedings of the 10th USENIX coriference on Operating Systems Design and Implementation, ser. OSDI' 12, 2012, pp. 335-348.
-
(2012)
Proceedings of the 10th USENIX Coriference on Operating Systems Design and Implementation, Ser. OSDI' 12
, pp. 335-348
-
-
Belay, A.1
Bittau, A.2
Mashtizadeh, A.3
Terei, D.4
Mazieres, D.5
Kozyrakis, C.6
-
5
-
-
84976708388
-
Hardware support for fast capability-based addressing
-
Nov
-
N. P. Carter, S. W. Keckler, and W. J. Dally, "Hardware support for fast capability-based addressing," SIGPLAN Not., vol. 29, no. 11 , pp. 319-327, Nov. 1994.
-
(1994)
SIGPLAN Not
, vol.29
, Issue.11
, pp. 319-327
-
-
Carter, N.P.1
Keckle, S.W.2
Dally, W.J.3
-
6
-
-
84905494891
-
Improving computer security using extended static checking
-
Oakland, California: IEEE Computer Society, May
-
B. Chess, "Improving computer security using extended static checking," in Proceedings of the 2002 Symposium on Security and Privacy. Oakland, California: IEEE Computer Society, May 2002, pp. 160-173.
-
(2002)
Proceedings of the 2002 Symposium on Security and Privacy
, pp. 160-173
-
-
Chess, B.1
-
7
-
-
0020716304
-
A processor family for personal computers
-
R. Childs Jr, J. Crawford, D. House, and R. Noyce, "A Processor Family for Personal Computers," Proceedings of the 1EEE, vol. 72, no. 3 , pp. 363-376, 1984.
-
(1984)
Proceedings of the 1EEE
, vol.72
, Issue.3
, pp. 363-376
-
-
Childs Jr., R.1
Crawford, J.2
House, D.3
Noyce, R.4
-
9
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
IEEE
-
C. Cowan, F. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer overflows: Attacks and defenses for the vulnerability of the decade," in DARPA Iriformation Survivability Coriference and Exposition, 2000. DlSCEX'OO. Proceedings, vol. 2. IEEE, 2000, pp. 119-129.
-
(2000)
DARPA Iriformation Survivability Coriference and Exposition 2000. Dlscex'Oo. Proceedings
, vol.2
, pp. 119-129
-
-
Cowan, C.1
Wagle, F.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
10
-
-
84976746765
-
Virtual memory
-
P. Denning, "Virtual memory," ACM Computing Surveys (CSUR), vol. 2, no. 3, pp. 153-189, 1970.
-
(1970)
ACM Computing Surveys (CSUR)
, vol.2
, Issue.3
, pp. 153-189
-
-
Denning, P.1
-
11
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
J. B. Dennis and E. C. Van Horn, "Programming semantics for multiprogrammed computations," Commun. ACM, vol. 9, no. 3, pp. 143-155, 1966.
-
(1966)
Commun ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
12
-
-
77957771407
-
Hardbound: Architectural support for spatial safety of the C programming language
-
Mar
-
J. Devietti, C. Blundell, M. M. K. Martin, and S. Zdancewic, "Hardbound: architectural support for spatial safety of the C programming language," SIGARCH Comput. Archit. News, vol. 36, no. 1 , pp. 103-114, Mar. 2008.
-
(2008)
SIGARCH Comput. Archit. News
, vol.36
, Issue.1
, pp. 103-114
-
-
Devietti, J.1
Blundell, C.2
Martin, M.M.K.3
Zdancewic, S.4
-
13
-
-
78650613386
-
A scalable concurrent malloc(3) implementation for FreeBSD
-
J. Evans, " A scalable concurrent malloc(3) implementation for FreeBSD," in BSDCan, 2006.
-
(2006)
BSDCan
-
-
Evans, J.1
-
14
-
-
0000078545
-
Dynamic storage allocation in the Atlas computer, including an automatic use of a backing store
-
J. Fotheringham, "Dynamic storage allocation in the Atlas computer, including an automatic use of a backing store," Communications of the ACM, vol. 4, no. 10, pp. 435-436, 1961.
-
(1961)
Communications of the ACM
, vol.4
, Issue.10
, pp. 435-436
-
-
Fotheringham, J.1
-
15
-
-
84905464788
-
Introducing new ARM Cortex-R technology for safe and reliable systems
-
A. Frame and C. Turner, "Introducing new ARM Cortex-R technology for safe and reliable systems," ARM, Tech. Rep., 03 2011.
-
ARM, Tech. Rep
, vol.3
, pp. 2011
-
-
Frame, A.1
Turner, C.2
-
18
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang, "Cyclone: A safe dialect of C," in ATEC '02: Proceedings of the USENIX Annual Technical Conference, 2002, pp. 275-288.
-
(2002)
ATEC '02: Proceedings of the USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
19
-
-
77953210383
-
SeL4: Formal verification of an operatingsystem kernel
-
June
-
G. Klein, J. Andronick, K. Elphinstone, G. Heiser, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal verification of an operatingsystem kernel," Commun. ACM, vol. 53, pp. 107-115 , June 2009.
-
(2009)
Commun ACM
, vol.53
, pp. 107-115
-
-
Klein, G.1
Andronick, J.2
Elphinstone, K.3
Heiser, G.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
20
-
-
84889021222
-
Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security
-
November
-
A. Kwon, U. Dhawan, J. M. Smith, T. F. Knight, Jr., and A. DeHon, "Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security," in 20th ACM Conference on Computer and Communications Security, November 2013.
-
(2013)
20th ACM Conference on Computer and Communications Security
-
-
Kwon, A.1
Dhawan, U.2
Smith, J.M.3
Knight Jr., T.F.4
Dehon, A.5
-
24
-
-
82655175538
-
Software fault isolation with API integrity and multi-principal modules
-
Y. Mao, H. Chen, D. Zhou, X. Wang, N. Zeldovich, and M. F. Kaashoek, "Software fault isolation with API integrity and multi-principal modules," in SOSP 2011: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, 2011.
-
(2011)
SOSP 2011: Proceedings of the 23rd ACM Symposium on Operating Systems Principles
-
-
Mao, Y.1
Chen, H.2
Zhou, D.3
Wang, X.4
Zeldovich, N.5
Kaashoek, M.F.6
-
25
-
-
33751516037
-
The architecture of the Burroughs B5000: 20 years later and still ahead of the times?
-
A. J. Mayer, 'The architecture of the Burroughs B5000: 20 years later and still ahead of the times?" ACM SIGARCH Computer Architecture News, vol. 10, no. 4, pp. 3-10, 1982.
-
(1982)
ACM SIGARCH Computer Architecture News
, vol.10
, Issue.4
, pp. 3-10
-
-
Mayer, A.J.1
-
27
-
-
84876584181
-
Practical, transparent operating system support for superpages
-
J. Navarro, S. Iyer, P. Druschel, and A. L. Cox, "Practical, transparent operating system support for superpages," in OSDI, 2002.
-
(2002)
OSDI
-
-
Navarro, J.1
Iyer, S.2
Druschel, P.3
Cox, A.L.4
-
28
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
G. C. Necula, S. McPeak, and W. Weimer, "CCured: Type-safe retrofitting of legacy code," in ACM SIGPLAN Notices, vol. 37, no. 1 , 2002, pp. 128-139.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.1
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
30
-
-
84976758928
-
Supporting Ada memory management in the iAPX-432
-
F. J. Pollack, G. W. Cox, D. W. Hammerstrom, K. C. Kahn, K. K. Lai, and J. R. Rattner, "Supporting Ada memory management in the iAPX-432," in ACM SIGARCH Computer Architecture News, vol. 10, no. 2, 1982, pp. 117-131.
-
(1982)
ACM SIGARCH Computer Architecture News
, vol.10
, Issue.2
, pp. 117-131
-
-
Pollack, F.J.1
Cox, G.W.2
Hammerstrom, D.W.3
Kahn, K.C.4
Lai, K.K.5
Rattner, J.R.6
-
31
-
-
84959045837
-
A comprehensive approach to array bounds check elimination for Java
-
Springer
-
F. Qian, L. Hendren, and C. Verbrugge, "A comprehensive approach to array bounds check elimination for Java," in Compiler Construction. Springer, 2002, pp. 325-341.
-
(2002)
Compiler Construction
, pp. 325-341
-
-
Qian, F.1
Hendren, L.2
Verbrugge, C.3
-
32
-
-
84939729984
-
Dynamic storage allocation systems
-
B. Randell and C. Kuehner, "Dynamic Storage Allocation Systems," Communications of the ACM, vol. 11 , no. 5, pp. 297-306, 1968.
-
(1968)
Communications of the ACM
, vol.11
, Issue.5
, pp. 297-306
-
-
Randell, B.1
Kuehner, C.2
-
33
-
-
70349086407
-
Isolating web programs in modern browser architectures
-
New York, NY, USA: ACM
-
c. Reis and S. D. Gribble, "Isolating web programs in modern browser architectures," in EuroSys '09: Proceedings of the 4th ACM European Conference on Computer Systems. New York, NY, USA: ACM, 2009, pp. 219-232.
-
(2009)
EuroSys '09: Proceedings of the 4th ACM European Conference on Computer Systems
, pp. 219-232
-
-
Reis, C.1
Gribble, S.D.2
-
34
-
-
0029273301
-
Supporting dynamic data structures on distributed-memory machines
-
Mar
-
A. Rogers, M. C. Carlisle, J. H. Reppy, and L. J. Hendren, "Supporting dynamic data structures on distributed-memory machines," ACM Trans. Program. Lang. Syst., vol. 17 , no. 2, pp. 233-263, Mar. 1995.
-
(1995)
ACM Trans. Program. Lang. Syst
, vol.17
, Issue.2
, pp. 233-263
-
-
Rogers, A.1
Carlisle, M.C.2
Reppy, J.H.3
Hendren, L.J.4
-
35
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE, vol. 63, no. 9, pp. 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
36
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
March
-
M. Schroeder and J. Saltzer, "A hardware architecture for implementing protection rings," Communications of the ACM, vol. 15 , no. 3, March 1972.
-
(1972)
Communications of the ACM
, vol.15
, Issue.3
-
-
Schroeder, M.1
Saltzer, J.2
-
37
-
-
84887487314
-
AddressSanitizer: A fast address sanity checker
-
K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov, "AddressSanitizer: A fast address sanity checker," in USENIX ATC, vol. 12, 2012.
-
USENIX ATC
, vol.12
, pp. 2012
-
-
Serebryany, K.1
Bruening, D.2
Potapenko, A.3
Vyukov, D.4
-
38
-
-
33646068753
-
Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection
-
Mar
-
R. Shetty, M. Kharbutli, Y. Solihin, and M. Prvulovic, "Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection," IBM J. Res. Dev., vol. 50, no. 2/3, pp. 261-275 , Mar. 2006.
-
(2006)
IBM J. Res. Dev
, vol.50
, Issue.2-3
, pp. 261-275
-
-
Shetty, R.1
Kharbutli, M.2
Solihin, Y.3
Prvulovic, M.4
-
39
-
-
0027836576
-
Efficient software-based fault isolation
-
New York, NY, USA
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. U. L. Graham, "Efficient software-based fault isolation," in SOSP '93: Proceedings of the fourteenth ACM Symposium on Operating Systems Principles, New York, NY, USA, 1993, pp. 203-216.
-
(1993)
SOSP '93: Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.U.L.4
-
40
-
-
85067179564
-
Capsicum: Practical capabilities for unix
-
USENIX, August
-
R. N. M. Watson, J. Anderson, B. Laurie, and K. Kennaway, "Capsicum: Practical capabilities for Unix," in Proceedings of the 19th USENIX Security Symposium. USENIX, August 2010.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Watson, R.N.M.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
41
-
-
84905464781
-
-
University of Cambridge, Computer Lab., Tech. Rep. UCAM-CL-TR-850, May 2014
-
R. N. M. Watson, P. G. Neumann, J. Woodruff, J. Anderson, D. Chisnall, B. Davis, B. Laurie, S. W. Moore, S. J. Murdoch, and M. Roe, "Capability Hardware Enhanced RISC Instructions: CHERI Instruction-S et Architecture," University of Cambridge, Computer Lab., Tech. Rep. UCAM-CL-TR-850, May 2014. [Online]. Available: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-850.html
-
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-S et Architecture
-
-
Watson, R.N.M.1
Neumann, P.G.2
Woodruff, J.3
Anderson, J.4
Chisnall, D.5
Davis, B.6
Laurie, B.7
Moore, S.W.8
Murdoch, S.J.9
Roe, M.10
-
43
-
-
33748188187
-
A penetration study of a burroughs large system
-
January
-
A. Wilkinson et al., "A penetration study of a Burroughs large system," ACM Operating Systems Review, vol. 15, no. 1, pp. 14-25, January 1981.
-
(1981)
ACM Operating Systems Review
, vol.15
, Issue.1
, pp. 14-25
-
-
Wilkinson, A.1
-
45
-
-
33845457031
-
Mondrian memory protection
-
E. Witchel, J. Cates, and K. Asanovic, Mondrian memory protection. ACM, 2002, vol. 37, no. 10.
-
(2002)
ACM
, vol.37
, Issue.10
-
-
Witchel, E.1
Cates, J.2
Asanovic, K.3
-
47
-
-
33746190591
-
An object-aware memory architecture
-
G. Wright, M. L. Seidl, and M. Wolczko, "An object-aware memory architecture," Science of Computer Programming, vol. 62, pp. 145-163, 2006.
-
(2006)
Science of Computer Programming
, vol.62
, pp. 145-163
-
-
Wright, G.1
Seidl, M.L.2
Wolczko, M.3
-
48
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, "Native client: A sandbox for portable, untrusted x86 native code," in SP '09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, 2009, pp. 79-93.
-
(2009)
SP '09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|