-
1
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
ACM
-
ABADI, M., BUDIU, M., Ú LFAR ERLINGSSON, AND LIGATTI, J. Control-flow integrity: Principles, implementations, and applications. In Proceedings of the 12th ACM conference on Computer and Communications Security (2005), ACM, pp. 340-353.
-
Proceedings of the 12th ACM Conference on Computer and Communications Security (2005)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
2
-
-
0011730379
-
-
Tech. rep., Computer Science Department, Carnegie Mellon University, August
-
ACCETTA, M., BARON, R., GOLUB, D., RASHID, R., TEVANIAN, A., AND YOUNG, M. Mach: A New Kernel Foundation for UNIX Development. Tech. rep., Computer Science Department, Carnegie Mellon University, August 1986.
-
(1986)
Mach: A New Kernel Foundation for UNIX Development
-
-
Accetta, M.1
Baron, R.2
Golub, D.3
Rashid, R.4
Tevanian, A.5
Young, M.6
-
3
-
-
51849104627
-
TrustZone: Integrated hardware and software security
-
ALVES, T., AND FELTON, D. TrustZone: Integrated hardware and software security. Information Quarterly 3, 4 (2004).
-
(2004)
Information Quarterly
, vol.3
, pp. 4
-
-
Alves, T.1
Felton, D.2
-
4
-
-
0004200684
-
-
Tech. Rep. ESD-TR-73-51, U.S. Air Force Electronic Systems Division, October (Two volumes)
-
ANDERSON, J. Computer security technology planning study. Tech. Rep. ESD-TR-73-51, U.S. Air Force Electronic Systems Division, October 1972. (Two volumes).
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.1
-
5
-
-
0029211469
-
Practical domain and type enforcement for Unix
-
May IEEE
-
BADGER, L., STERNE, D., SHERMAN, D., WALKER, K., AND HAGHIGHAT, S. Practical domain and type enforcement for Unix. In Proceedings of the 1995 Symposium on Security and Privacy (May 1995), IEEE.
-
(1995)
Proceedings of the 1995 Symposium on Security and Privacy
-
-
Badger, L.1
Sterne, D.2
Sherman, D.3
Walker, K.4
Haghighat, S.5
-
6
-
-
84875859350
-
Dune: Safe user-level access to privileged CPU features
-
USENIX
-
BELAY, A., BITTAU, A., MASHTIZADEH, A., TEREI, D., MAZIÈRES, D., AND KOZYRAKIS, C. Dune: safe user-level access to privileged CPU features. In Proceedings of the 10th Conference on Operating Systems Design and Implementation (2012), USENIX.
-
(2012)
Proceedings of the 10th Conference on Operating Systems Design and Implementation
-
-
Belay, A.1
Bittau, A.2
Mashtizadeh, A.3
Terei, D.4
Mazières, D.5
Kozyrakis, C.6
-
7
-
-
0003400251
-
-
Tech. Rep. MTR-2547 (three volumes), The Mitre Corporation, Bedford, Massachusetts, March-December
-
BELL, D., AND PADULA, L. L. Secure computer systems : Volume I-mathematical foundations; volume II-a mathematical model; volume III-a refinement of the mathematical model. Tech. Rep. MTR-2547 (three volumes), The Mitre Corporation, Bedford, Massachusetts, March-December 1973.
-
(1973)
Secure Computer Systems : Volume I-mathematical Foundations; Volume II-a Mathematical Model; Volume III-a Refinement of the Mathematical Model
-
-
Bell, D.1
Padula, L.L.2
-
8
-
-
0003400251
-
-
Tech. Rep. ESD-TR-75-306 The Mitre Corporation, Bedford, Massachusetts, March
-
BELL, D., AND PADULA, L. L. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. ESD-TR-75-306, The Mitre Corporation, Bedford, Massachusetts, March 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.1
Padula, L.L.2
-
9
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Bedford, Massachusetts, June 1975. Also available from USAF Electronic Systems Division, Bedford, Massachusetts, as ESD-TR-76-372, April
-
BIBA, K. Integrity considerations for secure computer systems. Tech. Rep. MTR 3153, The Mitre Corporation, Bedford, Massachusetts, June 1975. Also available from USAF Electronic Systems Division, Bedford, Massachusetts, as ESD-TR-76-372, April 1977.
-
(1977)
Tech. Rep. MTR 3153, the Mitre Corporation
-
-
Biba, K.1
-
10
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
USENIX
-
BITTAU, A., MARCHENKO, P., HANDLEY, M., AND KARP, B. Wedge: Splitting Applications into Reduced-Privilege Compartments. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (2008), USENIX.
-
(2008)
Proceedings of the 5th Symposium on Networked Systems Design and Implementation
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
13
-
-
84976708388
-
Hardware support for fast capability-based addressing
-
Nov.
-
CARTER, N. P., KECKLER, S. W., AND DALLY, W. J. Hardware support for fast capability-based addressing. SIGPLAN Not. 29, 11 (Nov. 1994), 319-327.
-
(1994)
SIGPLAN Not.
, vol.29
, Issue.11
, pp. 319-327
-
-
Carter, N.P.1
Keckler, S.W.2
Dally, W.J.3
-
14
-
-
84893320084
-
SAFE: A clean-slate architecture for secure systems
-
Nov.
-
CHIRICESCU, S., DEHON, A., DEMANGE, D., IYER, S., KLIGER, A., MORRISETT, G., PIERCE, B. C., REUBENSTEIN, H., SMITH, J. M., SULLIVAN, G. T., THOMAS, A., TOV, J., WHITE, C. M., AND WITTENBERG, D. SAFE: A clean-slate architecture for secure systems. In Proceedings of the IEEE International Conference on Technologies for Homeland Security (Nov. 2013).
-
(2013)
Proceedings of the IEEE International Conference on Technologies for Homeland Security
-
-
Chiricescu, S.1
Dehon, A.2
Demange, D.3
Iyer, S.4
Kliger, A.5
Morrisett, G.6
Pierce, B.C.7
Reubenstein, H.8
Smith, J.M.9
Sullivan, G.T.10
Thomas, A.11
Tov, J.12
White, C.M.13
Wittenberg, D.14
-
15
-
-
84939144389
-
Beyond the PDP-11: Processor support for a memory-safe C abstract machine
-
ACM
-
CHISNALL, D., ROTHWELL, C., DAVIS, B., WATSON, R. N., WOODRUFF, J., VADERA, M., MOORE, S. W., NEUMANN, P. G., AND ROE, M. Beyond the PDP-11: Processor support for a memory-safe C abstract machine. In Proceedings of the 20th Architectural Support for Programming Languages and Operating Systems (2015), ACM.
-
(2015)
Proceedings of the 20th Architectural Support for Programming Languages and Operating Systems
-
-
Chisnall, D.1
Rothwell, C.2
Davis, B.3
Watson, R.N.4
Woodruff, J.5
Vadera, M.6
Moore, S.W.7
Neumann, P.G.8
Roe, M.9
-
16
-
-
85060818077
-
Introduction and overview of the Multics system
-
New York, NY, USA ACM
-
CORBATÓ, F. J., AND VYSSOTSKY, V. A. Introduction and overview of the Multics system. In AFIPS '65 (Fall, part I): Proceedings of the November 30-December 1, 1965, fall joint computer conference, part I (New York, NY, USA, 1965), ACM, pp. 185-196.
-
(1965)
AFIPS '65 (Fall, Part I): Proceedings of the November 30-December 1, 1965, Fall Joint Computer Conference, Part i
, pp. 185-196
-
-
Corbató, F.J.1
Vyssotsky, V.A.2
-
17
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
DENNIS, J. B., AND VAN HORN, E. C. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (1966), 143-155.
-
(1966)
Commun. ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, C.E.2
-
18
-
-
77957771407
-
Hardbound: Architectural support for spatial safety of the C programming language
-
Mar.
-
DEVIETTI, J., BLUNDELL, C., MARTIN, M. M. K., AND ZDANCEWIC, S. Hardbound: architectural support for spatial safety of the C programming language. SIGARCH Comput. Archit. News 36, 1 (Mar. 2008), 103-114.
-
(2008)
SIGARCH Comput. Archit. News
, vol.36
, Issue.1
, pp. 103-114
-
-
Devietti, J.1
Blundell, C.2
Martin, M.M.K.3
Zdancewic, S.4
-
19
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
December USENIX
-
GONG, L., MUELLER, M., PRAFULLCHANDRA, H., AND SCHEMERS, R. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In Proceedings of the Symposium on Internet Technologies and Systems (December 1997), USENIX.
-
(1997)
Proceedings of the Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
21
-
-
84939193910
-
-
INTEL PLC. July
-
INTEL PLC. Introduction to Intel memory protection extensions. http://software.intel.com/en-us/articles/introduction-to-intel-memory-protection-extensions, July 2013.
-
(2013)
Introduction to Intel Memory Protection Extensions
-
-
-
23
-
-
85084164164
-
Cyclone: A safe dialect of C
-
JIM, T., MORRISETT, J. G., GROSSMAN, D., HICKS, M. W., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In Proceedings of the USENIX Annual Technical Conference (2002), pp. 275-288.
-
(2002)
Proceedings of the USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
26
-
-
84948971509
-
Multics security evaluation: Vulnerability analysis
-
(Las Vegas, Nevada, December 2002). Originally available as U.S. Air Force report ESD-TR-74-193 Hanscomb Air Force Base, Massachusetts
-
KARGER, P., AND SCHELL, R. Multics security evaluation: Vulnerability analysis. In Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Classic Papers section (Las Vegas, Nevada, December 2002). Originally available as U.S. Air Force report ESD-TR-74-193, Vol. II, Hanscomb Air Force Base, Massachusetts.
-
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Classic Papers Section
, vol.2
-
-
Karger, P.1
Schell, R.2
-
28
-
-
77953210383
-
SeL4: Formal verification of an operating-system kernel
-
June
-
KLEIN, G., ANDRONICK, J., ELPHINSTONE, K., HEISER, G., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., AND WINWOOD, S. seL4: Formal verification of an operating-system kernel. Commun. ACM 53 (June 2009), 107-115.
-
(2009)
Commun. ACM
, vol.53
, pp. 107-115
-
-
Klein, G.1
Andronick, J.2
Elphinstone, K.3
Heiser, G.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
29
-
-
84889021222
-
Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security
-
November
-
KWON, A., DHAWAN, U., SMITH, J. M., KNIGHT, JR., T. F., AND DE-HON, A. Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security. In 20th ACM Conference on Computer and Communications Security (November 2013).
-
(2013)
20th ACM Conference on Computer and Communications Security
-
-
Kwon, A.1
Dhawan, U.2
Smith, J.M.3
Knight, Jr.T.F.4
De-Hon, A.5
-
35
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, MD, USA
-
MILLER, M. S. Robust composition: towards a unified approach to access control and concurrency control. PhD thesis, Johns Hopkins University, Baltimore, MD, USA, 2006.
-
(2006)
Robust Composition: Towards A Unified Approach to Access Control and Concurrency Control
-
-
Miller, M.S.1
-
36
-
-
70349127409
-
-
May
-
MILLER, M. S., SAMUEL, M., LAURIE, B., AWAD, I., AND STAY, M. Caja: Safe active content in sanitized javascript, May 2008. http://google-caja.googlecode.com/files/caja-spec-2008-06-07.pdf.
-
(2008)
Caja: Safe Active Content in Sanitized Javascript
-
-
Miller, M.S.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
38
-
-
70450237674
-
SoftBound: Highly compatible and complete spatial memory safety for C
-
ACM
-
NAGARAKATTE, S., ZHAO, J., MARTIN, M. M. K., AND ZDANCEWIC, S. SoftBound: highly compatible and complete spatial memory safety for C. In Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation (2009), ACM.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.K.3
Zdancewic, S.4
-
39
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
NECULA, G. C., MCPEAK, S., AND WEIMER, W. CCured: Type-safe retrofitting of legacy code. ACM SIGPLAN Notices 37, 1 (2002), 128-139.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.1
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
40
-
-
0347229432
-
-
Tech. rep., Computer Science Laboratory, SRI International, May 2nd edition, Report CSL-116
-
NEUMANN, P., BOYER, R., FEIERTAG, R., LEVITT, K., AND ROBINSON, L. A Provably Secure Operating System: The system, its applications, and proofs. Tech. rep., Computer Science Laboratory, SRI International, May 1980. 2nd edition, Report CSL-116.
-
(1980)
A Provably Secure Operating System: The System, Its Applications, and Proofs
-
-
Neumann, P.1
Boyer, R.2
Feiertag, R.3
Levitt, K.4
Robinson, L.5
-
43
-
-
0016081584
-
Protection and the control of information sharing in Multics
-
July
-
SALTZER, J. Protection and the control of information sharing in Multics. Commun. ACM 17, 7 (July 1974), 388-402.
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.1
-
44
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
March
-
SCHROEDER, M., AND SALTZER, J. A hardware architecture for implementing protection rings. Commun. ACM 15, 3 (March 1972).
-
(1972)
Commun. ACM
, vol.15
, pp. 3
-
-
Schroeder, M.1
Saltzer, J.2
-
46
-
-
84881235941
-
Eternal war in memory
-
SZEKERES, L., PAYER, M., WEI, T., AND SONG, D. Eternal war in memory. In IEEE Symposium on Security and Privacy (2013).
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
49
-
-
85105238769
-
Efficient software-based fault isolation
-
ACM
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. U. L. Efficient software-based fault isolation. In Proceedings of the 14th Symposium on Operating Systems Principles (1993), ACM.
-
(1993)
Proceedings of the 14th Symposium on Operating Systems Principles
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.U.L.4
-
51
-
-
84945221607
-
-
Tech. Rep. UCAM-CL-TR-852, University of Cambridge, Computer Laboratory, Apr.
-
WATSON, R. N., WOODRUFF, J., CHISNALL, D., DAVI S, B., KOSZEK, W., MARKETTOS, A. T., MOORE, S. W., MURDOCH, S. J., NEUMANN, P. G., NORTON, R., AND ROE, M. Bluespec Extensible RISC Implementation: BERI Hardware reference. Tech. Rep. UCAM-CL-TR-852, University of Cambridge, Computer Laboratory, Apr. 2014.
-
(2014)
Bluespec Extensible RISC Implementation: BERI Hardware Reference
-
-
Watson, R.N.1
Woodruff, J.2
Chisnall, D.3
Davi, S.B.4
Koszek, W.5
Markettos, A.T.6
Moore, S.W.7
Murdoch, S.J.8
Neumann, P.G.9
Norton, R.10
Roe, M.11
-
52
-
-
84873650573
-
A decade of OS access-control extensibility
-
Feb.
-
WAT S O N, R. N. M. A decade of OS access-control extensibility. Commun. ACM 56, 2 (Feb. 2013).
-
(2013)
Commun. ACM
, vol.56
, pp. 2
-
-
Wat, S.O.N.1
-
53
-
-
85067179564
-
Capsicum: Practical capabilities for Unix
-
August USENIX
-
WATSON, R. N. M., ANDERSON, J., LAURIE, B., AND KENNAWAY, K. Capsicum: Practical capabilities for Unix. In Proceedings of the 19th USENIX Security Symposium (August 2010), USENIX.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Watson, R.N.M.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
54
-
-
84905464781
-
-
Tech. Rep. UCAM-CL-TR-864, University of Cambridge, Computer Laboratory, Dec.
-
WATSON, R. N. M., NEUMANN, P. G., WOODRUFF, J., ANDERSON, J., CHISNALL, D., DAVIS, B., LAURIE, B., MOORE, S. W., MURDOCH, S. J., AND ROE, M. Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture. Tech. Rep. UCAM-CL-TR-864, University of Cambridge, Computer Laboratory, Dec. 2014.
-
(2014)
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set Architecture
-
-
Watson, R.N.M.1
Neumann, P.G.2
Woodruff, J.3
Anderson, J.4
Chisnall, D.5
Davis, B.6
Laurie, B.7
Moore, S.W.8
Murdoch, S.J.9
Roe, M.10
-
56
-
-
0036957412
-
Mondrian memory protection
-
WITCHEL, E., CATES, J., AND ASANOVIĆ, K. Mondrian memory protection. ACM SIGPLAN Notices 37, 10 (2002), 304-316.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.10
, pp. 304-316
-
-
Witchel, E.1
Cates, J.2
Asanović, K.3
-
57
-
-
84905455833
-
The CHERI capability model: Revisiting RISC in an age of risk
-
June
-
WOODRUFF, J., WATSON, R. N. M., CHISNALL, D., MOORE, S. W., ANDERSON, J., DAV I S, B., LAURIE, B., NEUMANN, P. G., NORTON, R., AND ROE, M. The CHERI capability model: Revisiting RISC in an age of risk. In Proceedings of the 41st International Symposium on Computer Architecture (June 2014).
-
(2014)
Proceedings of the 41st International Symposium on Computer Architecture
-
-
Woodruff, J.1
Watson, R.N.M.2
Chisnall, D.3
Moore, S.W.4
Anderson, J.5
Davis, B.6
Laurie, B.7
Neumann, P.G.8
Norton, R.9
Roe, M.10
-
58
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
WULF, W., COHEN, E., CORWIN, W., JONES, A., LEVIN, R., PIER-SON, C., AND POLLACK, F. HYDRA: the kernel of a multiprocessor operating system. Commun. ACM 17, 6 (1974), 337-345.
-
(1974)
Commun. ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pier-Son, C.6
Pollack, F.7
-
59
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
IEEE
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J. B., MUTH, R., OR-MANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native Client: A sandbox for portable, untrusted x86 native code. In Proceedings of the 30th Symposium on Security and Privacy (2009), IEEE.
-
(2009)
Proceedings of the 30th Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Or-Mandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|