-
1
-
-
33646767376
-
Control-flow integrity
-
New York, NY, USA, ACM
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS'05, pages 340-353, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS'05
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
84897781978
-
Innovative technology for CPU based attestation and sealing
-
New York, NY, USA, ACM
-
I. Anati, S. Gueron, S. Johnson, and V. Scarlata. Innovative Technology for CPU based Attestation and Sealing. In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP'13, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP'13
-
-
Anati, I.1
Gueron, S.2
Johnson, S.3
Scarlata, V.4
-
3
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
New York, NY, USA, ACM
-
J. Ansel, P. Marchenko, U. Erlingsson, E. Taylor, B. Chen, D. L. Schuff, D. Sehr, C. L. Biffle, and B. Yee. Language-independent Sandboxing of Just-in-time Compilation and Self-modifying Code. In Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'11, pages 355-366, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'11
, pp. 355-366
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson, U.3
Taylor, E.4
Chen, B.5
Schuff, D.L.6
Sehr, D.7
Biffle, C.L.8
Yee, B.9
-
4
-
-
84995372517
-
-
AppArmor. https://wiki.ubuntu.com/AppArmor.
-
-
-
AppArmor1
-
5
-
-
84875859350
-
Dune: Safe user-level access to privileged CPU features
-
Berkeley, CA, USA, USENIX Association
-
A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D. Mazières, and C. Kozyrakis. Dune: Safe User-level Access to Privileged CPU Features. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12, pages 335-348, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12
, pp. 335-348
-
-
Belay, A.1
Bittau, A.2
Mashtizadeh, A.3
Terei, D.4
Mazières, D.5
Kozyrakis, C.6
-
6
-
-
0034442456
-
Hoard: A scalable memory allocator for multithreaded applications
-
New York, NY, USA, ACM
-
E. D. Berger, K. S. McKinley, R. D. Blumofe, and P. R. Wilson. Hoard: A Scalable Memory Allocator for Multithreaded Applications. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS IX, pages 117-128, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS IX
, pp. 117-128
-
-
Berger, E.D.1
McKinley, K.S.2
Blumofe, R.D.3
Wilson, P.R.4
-
7
-
-
63549095070
-
The PARSEC benchmark suite: Characterization and architectural implications
-
New York, NY, USA, ACM
-
C. Bienia, S. Kumar, J. P. Singh, and K. Li. The PARSEC Benchmark Suite: Characterization and Architectural Implications. In Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, PACT'08, pages 72-81, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, PACT'08
, pp. 72-81
-
-
Bienia, C.1
Kumar, S.2
Singh, J.P.3
Li, K.4
-
8
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
Berkeley, CA, USA, USENIX Association
-
A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: Splitting Applications into Reduced-privilege Compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pages 309-322, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08
, pp. 309-322
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
9
-
-
85084162921
-
Privtrans: Automatically partitioning programs for privilege separation
-
Berkeley, CA, USA, USENIX Association
-
D. Brumley and D. Song. Privtrans: Automatically Partitioning Programs for Privilege Separation. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 5-5, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04
, pp. 5
-
-
Brumley, D.1
Song, D.2
-
10
-
-
0034449405
-
An approach to safe object sharing
-
New York, NY, USA, ACM
-
C. Bryce and C. Razafimahefa. An Approach to Safe Object Sharing. In Proceedings of the 15th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, OOPSLA'00, pages 367-381, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 15th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, OOPSLA'00
, pp. 367-381
-
-
Bryce, C.1
Razafimahefa, C.2
-
11
-
-
84869486902
-
Abstractions for usable information flow control in aeolus
-
Berkeley, CA, USA, USENIX Association
-
W. Cheng, D. R. K. Ports, D. Schultz, V. Popic, A. Blankstein, J. Cowling, D. Curtis, L. Shrira, and B. Liskov. Abstractions for Usable Information Flow Control in Aeolus. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12, pages 12-12, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12
, pp. 12
-
-
Cheng, W.1
Ports, D.R.K.2
Schultz, D.3
Popic, V.4
Blankstein, A.5
Cowling, J.6
Curtis, D.7
Shrira, L.8
Liskov, B.9
-
13
-
-
84939168956
-
Nested kernel: An operating system architecture for intra-kernel privilege separation
-
New York, NY, USA, ACM
-
N. Dautenhahn, T. Kasampalis, W. Dietz, J. Criswell, and V. Adve. Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation. In Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS'15, pages 191-206, New York, NY, USA, 2015. ACM.
-
(2015)
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS'15
, pp. 191-206
-
-
Dautenhahn, N.1
Kasampalis, T.2
Dietz, W.3
Criswell, J.4
Adve, V.5
-
14
-
-
84995379386
-
-
Multiprocess Firefox. https://developer.mozilla.org/en-US/Firefox/Multiprocess Firefox.
-
-
-
Multiprocess Firefox1
-
16
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
Berkeley, CA, USA, USENIX Association
-
C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, pages 40-40, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 40
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
17
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
New York, NY, USA, ACM
-
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo. Using Innovative Instructions to Create Trustworthy Software Solutions. In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP'13, pages 11:1-11:1, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP'13
, pp. 111
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
18
-
-
84858305863
-
Ribbons: A partially shared memory programming model
-
New York, NY, USA, ACM
-
K. J. Hoffman, H. Metzger, and P. Eugster. Ribbons: A Partially Shared Memory Programming Model. In Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA'11, pages 289-306, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA'11
, pp. 289-306
-
-
Hoffman, K.J.1
Metzger, H.2
Eugster, P.3
-
20
-
-
84987628667
-
Automatic generation of data-oriented exploits
-
Washington, D. C., Aug, USENIX Association
-
H. Hu, Z. L. Chua, S. Adrian, P. Saxena, and Z. Liang. Automatic Generation of Data-Oriented Exploits. In 24th USENIX Security Symposium (USENIX Security 15), pages 177-192, Washington, D. C., Aug. 2015. USENIX Association.
-
(2015)
24th USENIX Security Symposium (USENIX Security 15)
, pp. 177-192
-
-
Hu, H.1
Chua, Z.L.2
Adrian, S.3
Saxena, P.4
Liang, Z.5
-
21
-
-
35448944821
-
Cloneable JVM: A new approach to start isolated Java applications faster
-
New York, NY, USA, ACM
-
K. Kawachiya, K. Ogata, D. Silva, T. Onodera, H. Komatsu, and T. Nakatani. Cloneable JVM: A New Approach to Start Isolated Java Applications Faster. In Proceedings of the 3rd International Conference on Virtual Execution Environments, VEE'07, pages 1-11, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 3rd International Conference on Virtual Execution Environments, VEE'07
, pp. 1-11
-
-
Kawachiya, K.1
Ogata, K.2
Silva, D.3
Onodera, T.4
Komatsu, H.5
Nakatani, T.6
-
22
-
-
84905484287
-
Flipping bits in memory without accessing them: An experimental study of dram disturbance errors
-
Piscataway, NJ, USA, IEEE Press
-
Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C. Wilkerson, K. Lai, and O. Mutlu. Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors. In Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA'14, pages 361-372, Piscataway, NJ, USA, 2014. IEEE Press.
-
(2014)
Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA'14
, pp. 361-372
-
-
Kim, Y.1
Daly, R.2
Kim, J.3
Fallin, C.4
Lee, J.H.5
Lee, D.6
Wilkerson, C.7
Lai, K.8
Mutlu, O.9
-
23
-
-
57749192483
-
Information flow control for standard os abstractions
-
New York, NY, USA, ACM
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for Standard OS Abstractions. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP'07, pages 321-334, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP'07
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
24
-
-
84937840405
-
A tale of two kernels: Towards ending kernel hardening wars with split kernel
-
New York, NY, USA, ACM
-
A. Kurmus and R. Zippel. A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS'14, pages 1366-1377, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS'14
, pp. 1366-1377
-
-
Kurmus, A.1
Zippel, R.2
-
26
-
-
85072935637
-
Evaluating SFI for a CISC architecture
-
Berkeley, CA, USA, USENIX Association
-
S. McCamant and G. Morrisett. Evaluating SFI for a CISC Architecture. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06
-
-
McCamant, S.1
Morrisett, G.2
-
27
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
Washington, DC, USA, IEEE Computer Society
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP'10, pages 143-158, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP'10
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
28
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
New York, NY, USA, ACM
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys'08, pages 315-328, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys'08
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
29
-
-
84977837849
-
Innovative instructions and software model for isolated execution
-
New York, NY, USA, ACM
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative Instructions and Software Model for Isolated Execution. In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP'13, pages 10:1-10:1, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP'13
, pp. 101
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
31
-
-
0032646625
-
Jflow: Practical mostly-static information flow control
-
New York, NY, USA, ACM
-
A. C. Myers. JFlow: Practical Mostly-static Information Flow Control. In Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL'99, pages 228-241, New York, NY, USA, 1999. ACM.
-
(1999)
Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL'99
, pp. 228-241
-
-
Myers, A.C.1
-
32
-
-
84959055219
-
Everything you want to know about pointer-based checking
-
Dagstuhl, Germany, Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik
-
S. Nagarakatte, M. M. K. Martin, and S. Zdancewic. Everything You Want to Know About Pointer-Based Checking. In 1st Summit on Advances in Programming Languages (SNAPL 2015), volume 32 of Leibniz International Proceedings in Informatics (LIPIcs), pages 190-208, Dagstuhl, Germany, 2015. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
-
(2015)
1st Summit on Advances in Programming Languages (SNAPL 2015), Volume 32 of Leibniz International Proceedings in Informatics (LIPIcs)
, pp. 190-208
-
-
Nagarakatte, S.1
Martin, M.M.K.2
Zdancewic, S.3
-
33
-
-
85048404745
-
Preventing privilege escalation
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, M. Friedl, and P. Honeyman. Preventing Privilege Escalation. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12, SSYM'03, pages 16-16, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12, SSYM'03
, pp. 16
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
34
-
-
70450227330
-
Laminar: Practical fine-grained decentralized information flow control
-
New York, NY, USA, ACM
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical Fine-grained Decentralized Information Flow Control. In Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'09, pages 63-74, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'09
, pp. 63-74
-
-
Roy, I.1
Porter, D.E.2
Bond, M.D.3
McKinley, K.S.4
Witchel, E.5
-
35
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
36
-
-
0016081584
-
Protection and the control of information sharing in multics
-
July
-
J. H. Saltzer. Protection and the Control of Information Sharing in Multics. Commun. ACM, 17(7):388-402, July 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
37
-
-
84995535282
-
-
Same-origin Policy. https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin policy.
-
-
-
Same-origin Policy1
-
39
-
-
84995417315
-
-
SELinux. https://wiki.centos.org/HowTos/SELinux.
-
-
-
SELinux1
-
40
-
-
84955320140
-
Salus: Kernel support for secure process compartments
-
R. Strackx, P. Agten, N. Avonds, and F. Piessens. Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety, 15(3), 1 2015.
-
(2015)
EAI Endorsed Transactions on Security and Safety
, vol.15
, Issue.3
, pp. 1
-
-
Strackx, R.1
Agten, P.2
Avonds, N.3
Piessens, F.4
-
41
-
-
84869412964
-
Fides: Selectively hardening software application components against kernel-level or process-level malware
-
New York, NY, USA, ACM
-
R. Strackx and F. Piessens. Fides: Selectively Hardening Software Application Components Against Kernel-level or Process-level Malware. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12, pages 2-13, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12
, pp. 2-13
-
-
Strackx, R.1
Piessens, F.2
-
42
-
-
84881235941
-
SoK: Eternal war in memory
-
Washington, DC, USA, IEEE Computer Society
-
L. Szekeres, M. Payer, T. Wei, and D. Song. SoK: Eternal War in Memory. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP'13, pages 48-62, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP'13
, pp. 48-62
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
43
-
-
84995511924
-
-
Valgrind. http://valgrind.org/.
-
-
-
Valgrind1
-
44
-
-
84905459124
-
CODOMs: Protecting software with code-centric memory domains
-
Piscataway, NJ, USA, IEEE Press
-
L. Vilanova, M. Ben-Yehuda, N. Navarro, Y. Etsion, and M. Valero. CODOMs: Protecting Software with Code-centric Memory Domains. In Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA'14, pages 469-480, Piscataway, NJ, USA, 2014. IEEE Press.
-
(2014)
Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA'14
, pp. 469-480
-
-
Vilanova, L.1
Ben-Yehuda, M.2
Navarro, N.3
Etsion, Y.4
Valero, M.5
-
45
-
-
79959862053
-
Compartmental memory management in a modern web browser
-
New York, NY, USA
-
G. Wagner, A. Gal, C. Wimmer, B. Eich, and M. Franz. Compartmental Memory Management in a Modern Web Browser. In Proceedings of the International Symposium on Memory Management, ISMM'11, pages 119-128, New York, NY, USA, 2011.
-
(2011)
Proceedings of the International Symposium on Memory Management, ISMM'11
, pp. 119-128
-
-
Wagner, G.1
Gal, A.2
Wimmer, C.3
Eich, B.4
Franz, M.5
-
46
-
-
0027836576
-
Efficient software-based fault isolation
-
New York, NY, USA, ACM
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient Software-based Fault Isolation. In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, SOSP'93, pages 203-216, New York, NY, USA, 1993. ACM.
-
(1993)
Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, SOSP'93
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
47
-
-
84995447736
-
Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications
-
Santa Clara, CA, July, USENIX Association
-
J. Wang, X. Xiong, and P. Liu. Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. In 2015 USENIX Annual Technical Conference (USENIX ATC 15), pages 361-373, Santa Clara, CA, July 2015. USENIX Association.
-
(2015)
2015 USENIX Annual Technical Conference (USENIX ATC 15)
, pp. 361-373
-
-
Wang, J.1
Xiong, X.2
Liu, P.3
-
48
-
-
85067179564
-
Capsicum: Practical capabilities for UNIX
-
R. N. Watson, J. Anderson, B. Laurie, and K. Kennaway. Capsicum: Practical Capabilities for UNIX. In USENIX Security 2010, pages 29-46, 2010.
-
(2010)
USENIX Security 2010
, pp. 29-46
-
-
Watson, R.N.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
49
-
-
84905455833
-
The CHERI capability model: Revisiting RISC in an age of risk
-
Piscataway, USA, IEEE Press
-
J. Woodruff, R. N. Watson, D. Chisnall, S. W. Moore, J. Anderson, B. Davis, B. Laurie, P. G. Neumann, R. Norton, and M. Roe. The CHERI Capability Model: Revisiting RISC in an Age of Risk. In Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA'14, pages 457-468, Piscataway, USA, 2014. IEEE Press.
-
(2014)
Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA'14
, pp. 457-468
-
-
Woodruff, J.1
Watson, R.N.2
Chisnall, D.3
Moore, S.W.4
Anderson, J.5
Davis, B.6
Laurie, B.7
Neumann, P.G.8
Norton, R.9
Roe, M.10
-
50
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
May
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In 2009 30th IEEE Symposium on Security and Privacy, pages 79-93, May 2009.
-
(2009)
2009 30th IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
51
-
-
84888352157
-
Making information flow explicit in histar
-
Berkeley, CA, USA, USENIX Association
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making Information Flow Explicit in HiStar. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7, OSDI'06, pages 19-19, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7, OSDI'06
, pp. 19
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
52
-
-
77952337533
-
Hardware enforcement of application security policies using tagged memory
-
Berkeley, CA, USA, USENIX Association
-
N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware Enforcement of Application Security Policies Using Tagged Memory. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08, pages 225-240, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08
, pp. 225-240
-
-
Zeldovich, N.1
Kannan, H.2
Dalton, M.3
Kozyrakis, C.4
|