Follow
Nathan Dautenhahn
Title
Cited by
Cited by
Year
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
2782014
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1872014
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
1792015
BreakApp: Automated, Flexible Application Compartmentalization.
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
NDSS, 2018
692018
Deconstructing Xen.
L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li
NDSS, 2017
652017
Fortifying web-based applications automatically
S Tang, N Dautenhahn, ST King
Proceedings of the 18th ACM conference on Computer and communications …, 2011
572011
QuickRec: Prototyping an Intel architecture extension for record and replay of multithreaded programs
G Pokam, K Danne, C Pereira, R Kassa, T Kranich, S Hu, J Gottschlich, ...
Proceedings of the 40th annual international symposium on computer …, 2013
462013
DeepMatch: practical deep packet inspection in the data plane using network processors
J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 16th International Conference on emerging Networking …, 2020
432020
Cyrus: Unintrusive application-level record-replay for replay parallelism
N Honarmand, N Dautenhahn, J Torrellas, ST King, G Pokam, C Pereira
ACM SIGARCH Computer Architecture News 41 (1), 193-206, 2013
332013
Microstache: A lightweight execution context for in-process safe region isolation
L Mogosanu, A Rane, N Dautenhahn
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
322018
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012
232012
μscope: A methodology for analyzing least-privilege compartmentalization in large software artifacts
N Roessler, L Atayde, I Palmer, D McKee, J Pandey, VP Kemerlis, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
192021
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
H Lefeuvre, VA Bădoiu, Y Chien, F Huici, N Dautenhahn, P Olivier
Proceedings of the 30th ISOC Annual Network & Distributed System Security …, 2023
122023
The endokernel: Fast, secure, and programmable subprocess virtualization
B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn
arXiv preprint arXiv:2108.03705, 2021
112021
Towards fine-grained, automated application compartmentalization
N Vasilakis, B Karel, N Roessler, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 9th Workshop on Programming Languages and Operating …, 2017
112017
Slipstream: Automatic interprocess communication optimization
W Dietz, J Cranmer, N Dautenhahn, V Adve
2015 USENIX Annual Technical Conference (USENIX ATC 15), 431-443, 2015
82015
The SANDstrom Hash.
MD Torgerson, TJ Draelos, RC Schroeppel
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2008
82008
Mechanism for facilitating dynamic and efficient management of instruction atomicity violations in software programs at computing systems
ND Dautenhahn, JE Gottschlich, G Pokam, CL Pereira, S Hu, K Danne, ...
US Patent 9,501,340, 2016
62016
Lossless instruction-to-object memory tracing in the Linux kernel
N Roessler, Y Chien, L Atayde, P Yang, I Palmer, L Gray, N Dautenhahn
Proceedings of the 14th ACM International Conference on Systems and Storage …, 2021
42021
Mechanism for facilitating dynamic and efficient management of instruction atomicity volations in software programs at computing systems
ND Dautenhahn, J Gottschlich, G Pokam, C Pereira, S Hu, K Danne, ...
US Patent 10,394,561, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20