Suivre
Nathan Dautenhahn
Titre
Citée par
Citée par
Année
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
2582014
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1772014
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
1542015
BreakApp: Automated, Flexible Application Compartmentalization.
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
NDSS, 2018
562018
Deconstructing Xen.
L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li
NDSS, 2017
532017
Fortifying web-based applications automatically
S Tang, N Dautenhahn, ST King
Proceedings of the 18th ACM conference on Computer and communications …, 2011
522011
QuickRec: Prototyping an Intel architecture extension for record and replay of multithreaded programs
G Pokam, K Danne, C Pereira, R Kassa, T Kranich, S Hu, J Gottschlich, ...
Proceedings of the 40th annual international symposium on computer …, 2013
432013
Cyrus: Unintrusive application-level record-replay for replay parallelism
N Honarmand, N Dautenhahn, J Torrellas, ST King, G Pokam, C Pereira
ACM SIGARCH Computer Architecture News 41 (1), 193-206, 2013
322013
Microstache: A lightweight execution context for in-process safe region isolation
L Mogosanu, A Rane, N Dautenhahn
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
282018
DeepMatch: practical deep packet inspection in the data plane using network processors
J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 16th International Conference on emerging Networking …, 2020
222020
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012
212012
Towards fine-grained, automated application compartmentalization
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 9th Workshop on Programming Languages and Operating …, 2017
92017
The endokernel: Fast, secure, and programmable subprocess virtualization
B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn
arXiv preprint arXiv:2108.03705, 2021
82021
The SANDstrom Hash.
MD Torgerson, TJ Draelos, RC Schroeppel
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2008
82008
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts
N Roessler, L Atayde, I Palmer, D McKee, J Pandey, VP Kemerlis, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
72021
Slipstream: Automatic interprocess communication optimization
W Dietz, J Cranmer, N Dautenhahn, V Adve
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 431-443, 2015
72015
Mechanism for facilitating dynamic and efficient management of instruction atomicity violations in software programs at computing systems
ND Dautenhahn, JE Gottschlich, G Pokam, CL Pereira, S Hu, K Danne, ...
US Patent 9,501,340, 2016
52016
Lossless instruction-to-object memory tracing in the Linux kernel
N Roessler, Y Chien, L Atayde, P Yang, I Palmer, L Gray, N Dautenhahn
Proceedings of the 14th ACM International Conference on Systems and Storage …, 2021
32021
Protection in commodity monolithic operating systems
ND Dautenhahn
32016
Mechanism for facilitating dynamic and efficient management of instruction atomicity volations in software programs at computing systems
ND Dautenhahn, J Gottschlich, G Pokam, C Pereira, S Hu, K Danne, ...
US Patent 10,394,561, 2019
22019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20