KCoFI: Complete control-flow integrity for commodity operating system kernels J Criswell, N Dautenhahn, V Adve 2014 IEEE symposium on security and privacy, 292-307, 2014 | 289 | 2014 |
Virtual ghost: Protecting applications from hostile operating systems J Criswell, N Dautenhahn, V Adve ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014 | 191 | 2014 |
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve Proceedings of the Twentieth International Conference on Architectural …, 2015 | 186 | 2015 |
BreakApp: Automated, Flexible Application Compartmentalization. N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith NDSS, 2018 | 77 | 2018 |
Deconstructing Xen. L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li NDSS, 2017 | 70 | 2017 |
Fortifying web-based applications automatically S Tang, N Dautenhahn, ST King Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 57 | 2011 |
DeepMatch: practical deep packet inspection in the data plane using network processors J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith Proceedings of the 16th International Conference on emerging Networking …, 2020 | 47 | 2020 |
QuickRec: Prototyping an Intel architecture extension for record and replay of multithreaded programs G Pokam, K Danne, C Pereira, R Kassa, T Kranich, S Hu, J Gottschlich, ... Proceedings of the 40th annual international symposium on computer …, 2013 | 46 | 2013 |
Microstache: A lightweight execution context for in-process safe region isolation L Mogosanu, A Rane, N Dautenhahn Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 35 | 2018 |
Cyrus: Unintrusive application-level record-replay for replay parallelism N Honarmand, N Dautenhahn, J Torrellas, ST King, G Pokam, C Pereira ACM SIGARCH Computer Architecture News 41 (1), 193-206, 2013 | 33 | 2013 |
Using replicated execution for a more secure and reliable web browser H Xue, N Dautenhahn, ST King Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012 | 23 | 2012 |
μscope: A methodology for analyzing least-privilege compartmentalization in large software artifacts N Roessler, L Atayde, I Palmer, D McKee, J Pandey, VP Kemerlis, ... Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 22 | 2021 |
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software H Lefeuvre, VA Bădoiu, Y Chien, F Huici, N Dautenhahn, P Olivier Proceedings of the 30th ISOC Annual Network & Distributed System Security …, 2023 | 18 | 2023 |
The endokernel: Fast, secure, and programmable subprocess virtualization B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn arXiv preprint arXiv:2108.03705, 2021 | 12 | 2021 |
Towards fine-grained, automated application compartmentalization N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith Proceedings of the 9th Workshop on Programming Languages and Operating …, 2017 | 12 | 2017 |
Slipstream: Automatic interprocess communication optimization W Dietz, J Cranmer, N Dautenhahn, V Adve 2015 USENIX Annual Technical Conference (USENIX ATC 15), 431-443, 2015 | 8 | 2015 |
The SANDstrom Hash. MD Torgerson, TJ Draelos, RC Schroeppel Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2008 | 8 | 2008 |
Mechanism for facilitating dynamic and efficient management of instruction atomicity violations in software programs at computing systems ND Dautenhahn, JE Gottschlich, G Pokam, CL Pereira, S Hu, K Danne, ... US Patent 9,501,340, 2016 | 6 | 2016 |
Lossless instruction-to-object memory tracing in the Linux kernel N Roessler, Y Chien, L Atayde, P Yang, I Palmer, L Gray, N Dautenhahn Proceedings of the 14th ACM International Conference on Systems and Storage …, 2021 | 4 | 2021 |
Protection in commodity monolithic operating systems ND Dautenhahn University of Illinois at Urbana-Champaign, 2016 | 3 | 2016 |