Follow
John Criswell
John Criswell
Verified email at cs.rochester.edu - Homepage
Title
Cited by
Cited by
Year
A predictable execution model for COTS-based embedded systems
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley
2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium …, 2011
3212011
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
2512014
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
2112007
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1722014
Nested kernel: An operating system architecture for intra-kernel privilege separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
1462015
Using likely invariants for automated software fault localization
SK Sahoo, J Criswell, C Geigle, V Adve
Proceedings of the eighteenth international conference on Architectural …, 2013
1222013
Hodor:{Intra-Process} Isolation for {High-Throughput} Data Plane Libraries
M Hedayati, S Gravani, E Johnson, J Criswell, ML Scott, K Shen, M Marty
2019 USENIX Annual Technical Conference (USENIX ATC 19), 489-504, 2019
992019
An empirical study of reported bugs in server software with implications for automated bug diagnosis
SK Sahoo, J Criswell, V Adve
2010 ACM/IEEE 32nd International Conference on Software Engineering 1, 485-494, 2010
862010
Memory Safety for Low-Level Software/Hardware Interactions.
J Criswell, N Geoffray, VS Adve
USENIX Security Symposium, 83-100, 2009
492009
Shielding Software From Privileged {Side-Channel} Attacks
X Dong, Z Shen, J Criswell, AL Cox, S Dwarkadas
27th USENIX Security Symposium (USENIX Security 18), 1441-1458, 2018
402018
Silhouette: Efficient protected shadow stacks for embedded systems
J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls
29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020
242020
Spectres, virtual ghosts, and hardware support
X Dong, Z Shen, J Criswell, A Cox, S Dwarkadas
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
24*2018
Beating OPT with statistical clairvoyance and variable size caching
P Li, C Pronovost, W Wilson, B Tait, J Zhou, C Ding, J Criswell
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
202019
Inter-disciplinary research challenges in computer systems for the 2020s
A Cohen, X Shen, J Torrellas, J Tuck, Y Zhou, S Adve, I Akturk, S Bagchi, ...
National Science Foundation, 2018
192018
A virtual instruction set interface for operating system kernels
J Criswell, B Monroe, V Adve
Workshop on the Interaction between Operating Systems and Computer …, 2006
182006
A predictable execution model for COTS-based embedded systems. In 2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley
Chicago, IL, USA, 269-279, 2011
172011
Iskios: Lightweight defense against kernel-level code-reuse attacks
S Gravani, M Hedayati, J Criswell, ML Scott
arXiv preprint arXiv:1903.04654, 2019
152019
Codestitcher: inter-procedural basic block layout optimization
R Lavaee, J Criswell, C Ding
Proceedings of the 28th International Conference on Compiler Construction, 65-75, 2019
152019
Baggy bounds with accurate checking
B Ding, Y He, Y Wu, A Miller, J Criswell
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
132012
Restricting control flow during speculative execution with Venkman
Z Shen, J Zhou, D Ojha, J Criswell
arXiv preprint arXiv:1903.10651, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20