Nathan Dautenhahn
Cited by
Cited by
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
BreakApp: Automated, Flexible Application Compartmentalization.
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
NDSS, 2018
Deconstructing Xen.
L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li
NDSS, 2017
Fortifying web-based applications automatically
S Tang, N Dautenhahn, ST King
Proceedings of the 18th ACM conference on Computer and communications …, 2011
QuickRec: Prototyping an Intel architecture extension for record and replay of multithreaded programs
G Pokam, K Danne, C Pereira, R Kassa, T Kranich, S Hu, J Gottschlich, ...
Proceedings of the 40th annual international symposium on computer …, 2013
DeepMatch: practical deep packet inspection in the data plane using network processors
J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 16th International Conference on emerging Networking …, 2020
Cyrus: Unintrusive application-level record-replay for replay parallelism
N Honarmand, N Dautenhahn, J Torrellas, ST King, G Pokam, C Pereira
ACM SIGARCH Computer Architecture News 41 (1), 193-206, 2013
Microstache: A lightweight execution context for in-process safe region isolation
L Mogosanu, A Rane, N Dautenhahn
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts
N Roessler, L Atayde, I Palmer, D McKee, J Pandey, VP Kemerlis, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
H Lefeuvre, VA Bădoiu, Y Chien, F Huici, N Dautenhahn, P Olivier
Proceedings of the 30th ISOC Annual Network & Distributed System Security …, 2023
The endokernel: Fast, secure, and programmable subprocess virtualization
B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn
arXiv preprint arXiv:2108.03705, 2021
Towards fine-grained, automated application compartmentalization
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 9th Workshop on Programming Languages and Operating …, 2017
Slipstream: Automatic interprocess communication optimization
W Dietz, J Cranmer, N Dautenhahn, V Adve
2015 USENIX Annual Technical Conference (USENIX ATC 15), 431-443, 2015
The SANDstrom Hash.
MD Torgerson, TJ Draelos, RC Schroeppel
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2008
Mechanism for facilitating dynamic and efficient management of instruction atomicity violations in software programs at computing systems
ND Dautenhahn, JE Gottschlich, G Pokam, CL Pereira, S Hu, K Danne, ...
US Patent 9,501,340, 2016
Lossless instruction-to-object memory tracing in the Linux kernel
N Roessler, Y Chien, L Atayde, P Yang, I Palmer, L Gray, N Dautenhahn
Proceedings of the 14th ACM International Conference on Systems and Storage …, 2021
Protection in commodity monolithic operating systems
ND Dautenhahn
The system can't perform the operation now. Try again later.
Articles 1–20