-
2
-
-
84954174375
-
-
Aug
-
CVS commit: pkgsrc/security/openssh, Aug. 2015. http://mail-index.netbsd.org/pkgsrc-changes/2015/08/14/msg128305.html.
-
(2015)
CVS Commit: Pkgsrc/security/openssh
-
-
-
3
-
-
0004200684
-
Computer security technology planning study
-
U.S. Air Force Electronic Systems Division, October
-
Anderson, J. Computer security technology planning study. Tech. Rep. ESD-TR-73-51, U.S. Air Force Electronic Systems Division, October 1972.
-
(1972)
Tech. Rep. ESD-TR-73-51
-
-
Anderson, J.1
-
4
-
-
31344435929
-
Cryptographic processors-A survey
-
Feb
-
Anderson, R., Bond, M., Clulow, J., and Skorobogatov, S. Cryptographic processors-a survey. Proceedings of the IEEE 94, 2 (Feb 2006), 357-369.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
5
-
-
84875859350
-
Dune: Safe user-level access to privileged CPU features
-
USENIX
-
Belay, A., Bittau, A., Mashtizadeh, A., Terei, D., Maziéres, D., and Kozyrakis, C. Dune: safe user-level access to privileged CPU features. In Proceedings of the 10th Conference on Operating Systems Design and Implementation (2012), USENIX.
-
(2012)
Proceedings of the 10th Conference on Operating Systems Design and Implementation
-
-
Belay, A.1
Bittau, A.2
Mashtizadeh, A.3
Terei, D.4
Maziéres, D.5
Kozyrakis, C.6
-
6
-
-
84940995903
-
A messy state of the union: Taming the composite state machines of TLS
-
Beurdouche, B., Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.-Y., and Zinzindohoue, J. K. A Messy State of the Union: Taming the Composite State Machines of TLS. In Proceedings of the IEEE Symposium on Security and Privacy (2015).
-
(2015)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Beurdouche, B.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Fournet, C.4
Kohlweiss, M.5
Pironti, A.6
Strub, P.-Y.7
Zinzindohoue, J.K.8
-
7
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
USENIX
-
Bittau, A., Marchenko, P., Handley, M., and Karp, B. Wedge: Splitting Applications into Reduced-Privilege Compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (2008), USENIX.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
10
-
-
84948958710
-
Optimization of object-oriented programs using static class hierarchy analysis
-
ECOOP '95, Springer-Verlag
-
Dean, J., Grove, D., and Chambers, C. Optimization of object-oriented programs using static class hierarchy analysis. In Proceedings of the 9th European Conference on Object-Oriented Programming (1995), ECOOP '95, Springer-Verlag.
-
(1995)
Proceedings of the 9th European Conference on Object-Oriented Programming
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
11
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Dennis, J. B., and Van Horn, E. C. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (1966), 143-155.
-
(1966)
Commun ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
12
-
-
84970883402
-
-
Dolan, S., Williams, N., Tolnay, D., Lapresta, S., Langford, W., and Gordan, A. jq: a lightweight and exible command-line JSON processor. http://stedolan.github.io/jq/.
-
Jq: A Lightweight and Exible Command-line JSON Processor
-
-
Dolan, S.1
Williams, N.2
Tolnay, D.3
Lapresta, S.4
Langford, W.5
Gordan, A.6
-
13
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
-
USENIX
-
Gong, L., Mueller, M., Prafullchandra, H., and Schemers, R. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In Proceedings of the Symposium on Internet Technologies and Systems (1997), USENIX.
-
(1997)
Proceedings of the Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
14
-
-
84954095782
-
Clean application compartmentalization with SOAAP (extended version)
-
University of Cambridge Computer Laboratory, Sept
-
Gudka, K., Watson, R. N. M., Anderson, J., Chisnall, D., Davis, B., Laurie, B., Madhavapeddy, A., Marinos, I., Murdoch, S. J., Neumann, P. G., and Richardson, A. Clean Application Compartmentalization with SOAAP (extended version). Tech. Rep. UCAM-CL-TR-873, University of Cambridge Computer Laboratory, Sept. 2015.
-
(2015)
Tech. Rep. UCAM-CL-TR-873
-
-
Gudka, K.1
Watson, R.N.M.2
Anderson, J.3
Chisnall, D.4
Davis, B.5
Laurie, B.6
Madhavapeddy, A.7
Marinos, I.8
Murdoch, S.J.9
Neumann, P.G.10
Richardson, A.11
-
16
-
-
84877276181
-
-
Tech. Rep 1694, University of Wisconsin Madison, July
-
Harris, W. R., Farley, B., Jha, S., and Reps, T. Secure Programming as a Parity Game. Tech. Rep. 1694, University of Wisconsin Madison, July 2011.
-
(2011)
Secure Programming As A Parity Game
-
-
Harris, W.R.1
Farley, B.2
Jha, S.3
Reps, T.4
-
21
-
-
77953210383
-
SeL4: Formal verification of an operating-system kernel
-
June
-
Klein, G., Andronick, J., Elphinstone, K., Heiser, G., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., and Winwood, S. seL4: Formal verification of an operating-system kernel. Commun. ACM 53 (June 2009), 107-115.
-
(2009)
Commun ACM
, vol.53
, pp. 107-115
-
-
Klein, G.1
Andronick, J.2
Elphinstone, K.3
Heiser, G.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
23
-
-
84984064460
-
Policy/mechanism separation in Hydra
-
Levin, R., Cohen, E., Corwin, W., Pollack, F., and Wulf, W. Policy/mechanism separation in Hydra. In SOSP '75: Proceedings of the fifth ACM Symposium on Operating Systems Principles (1975).
-
(1975)
SOSP ' 75: Proceedings of the Fifth ACM Symposium on Operating Systems Principles
-
-
Levin, R.1
Cohen, E.2
Corwin, W.3
Pollack, F.4
Wulf, W.5
-
24
-
-
84954099056
-
Security kernels
-
ACM
-
Lipner, S. B., Wulf, W. A., Schell, R. R., Popek, G. J., Neumann, P. G., Weissman, C., and Linden, T. A. Security kernels. In AFIPS '74: Proceedings of the May 6-10, 1974, National Computer Conference and Exposition (1974), ACM.
-
(1974)
AFIPS '74: Proceedings of the May 6-10, 1974, National Computer Conference and Exposition
-
-
Lipner, S.B.1
Wulf, W.A.2
Schell, R.R.3
Popek, G.J.4
Neumann, P.G.5
Weissman, C.6
Linden, T.A.7
-
28
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, MD, USA
-
Miller, M. S. Robust composition: towards a unified approach to access control and concurrency control. PhD thesis, Johns Hopkins University, Baltimore, MD, USA, 2006.
-
(2006)
Robust Composition: Towards A Unified Approach to Access Control and Concurrency Control
-
-
Miller, M.S.1
-
30
-
-
0031543270
-
A decentralized model for information flow control
-
October
-
Myers, A. C., and Liskov, B. A decentralized model for information flow control. SIGOPS Oper. Syst. Rev. 31 (October 1997), 129-142.
-
(1997)
SIGOPS Oper. Syst. Rev
, vol.31
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
31
-
-
84970900313
-
-
NIST. libpoppler CVEs. https://web.nvd.nist.gov/view/vuln/search-results?cpe-vendor=cpe:/: freedesktop&cpe-product=cpe:/::poppler.
-
Libpoppler CVEs
-
-
NIST1
-
34
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Saltzer, J. H., and Schroeder, M. D. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (September 1975), 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
35
-
-
84970875796
-
InLTO: A fine-grained demand-driven infrastructure
-
Teresa Johnson, X. D. L. ThinLTO: A Fine-Grained Demand-Driven Infrastructure. In EuroLLVM (2015).
-
(2015)
RoLLVM
-
-
Teresa Johnson, X.D.L.1
-
37
-
-
84873650573
-
A decade of OS access-control extensibility
-
Feb.
-
Watson, R. N. M. A decade of OS access-control extensibility. Commun. ACM 56, 2 (Feb. 2013).
-
(2013)
Commun ACM
, vol.56
, Issue.2
-
-
Watson, R.N.M.1
-
38
-
-
85067179564
-
Capsicum: Practical capabilities for UNIX
-
USENIX
-
Watson, R. N. M., Anderson, J., Laurie, B., and Kennaway, K. Capsicum: Practical capabilities for UNIX. In Proceedings of the 19th USENIX Security Symposium (2010), USENIX.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Watson, R.N.M.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
39
-
-
84941001078
-
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
-
Watson, R. N. M., Woodruff, J., Neumann, P. G., Moore, S. W., Anderson, J., Chisnall, D., Dave, N., Davis, B., Gudka, K., Laurie, B., Murdoch, S. J., Norton, R., Roe, M., Son, S., and Vadera, M. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In Proceedings of the 36th IEEE Symposium on Security and Privacy (2015).
-
(2015)
Proceedings of the 36th IEEE Symposium on Security and Privacy
-
-
Watson, R.N.M.1
Woodruff, J.2
Neumann, P.G.3
Moore, S.W.4
Anderson, J.5
Chisnall, D.6
Dave, N.7
Davis, B.8
Gudka, K.9
Laurie, B.10
Murdoch, S.J.11
Norton, R.12
Roe, M.13
Son, S.14
Vadera, M.15
|