Follow
Nathan Dautenhahn
Title
Cited by
Cited by
Year
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
2502014
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1722014
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
1462015
BreakApp: Automated, Flexible Application Compartmentalization.
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
NDSS, 2018
532018
Deconstructing Xen.
L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li
NDSS, 2017
532017
Fortifying web-based applications automatically
S Tang, N Dautenhahn, ST King
Proceedings of the 18th ACM conference on Computer and communications …, 2011
512011
QuickRec: Prototyping an Intel architecture extension for record and replay of multithreaded programs
G Pokam, K Danne, C Pereira, R Kassa, T Kranich, S Hu, J Gottschlich, ...
Proceedings of the 40th annual international symposium on computer …, 2013
452013
Cyrus: Unintrusive application-level record-replay for replay parallelism
N Honarmand, N Dautenhahn, J Torrellas, ST King, G Pokam, C Pereira
ACM SIGARCH Computer Architecture News 41 (1), 193-206, 2013
322013
Microstache: A lightweight execution context for in-process safe region isolation
L Mogosanu, A Rane, N Dautenhahn
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
292018
DeepMatch: practical deep packet inspection in the data plane using network processors
J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 16th International Conference on emerging Networking …, 2020
212020
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012
212012
Towards fine-grained, automated application compartmentalization
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 9th Workshop on Programming Languages and Operating …, 2017
82017
The SANDstrom Hash.
MD Torgerson, TJ Draelos, RC Schroeppel
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2008
82008
Slipstream: Automatic interprocess communication optimization
W Dietz, J Cranmer, N Dautenhahn, V Adve
2015 USENIX Annual Technical Conference (USENIX ATC 15), 431-443, 2015
72015
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts
N Roessler, L Atayde, I Palmer, D McKee, J Pandey, VP Kemerlis, ...
24th International Symposium on Research in Attacks, Intrusions and Defenses …, 2021
52021
Mechanism for facilitating dynamic and efficient management of instruction atomicity violations in software programs at computing systems
ND Dautenhahn, JE Gottschlich, G Pokam, CL Pereira, S Hu, K Danne, ...
US Patent 9,501,340, 2016
52016
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn
arXiv preprint arXiv:2108.03705, 2021
42021
Protection in commodity monolithic operating systems
ND Dautenhahn
University of Illinois at Urbana-Champaign, 2016
32016
Lossless instruction-to-object memory tracing in the Linux kernel
N Roessler, Y Chien, L Atayde, P Yang, I Palmer, L Gray, N Dautenhahn
Proceedings of the 14th ACM International Conference on Systems and Storage …, 2021
22021
Mechanism for facilitating dynamic and efficient management of instruction atomicity volations in software programs at computing systems
ND Dautenhahn, J Gottschlich, G Pokam, C Pereira, S Hu, K Danne, ...
US Patent 10,394,561, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20