关注
John Criswell
John Criswell
在 cs.rochester.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A predictable execution model for COTS-based embedded systems
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley
2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium …, 2011
3712011
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
2992014
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
2272007
Nested kernel: An operating system architecture for intra-kernel privilege separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
1952015
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1922014
Hodor:{Intra-Process} isolation for {High-Throughput} data plane libraries
M Hedayati, S Gravani, E Johnson, J Criswell, ML Scott, K Shen, M Marty
2019 USENIX Annual Technical Conference (USENIX ATC 19), 489-504, 2019
1852019
Using likely invariants for automated software fault localization
SK Sahoo, J Criswell, C Geigle, V Adve
Proceedings of the eighteenth international conference on Architectural …, 2013
1322013
An empirical study of reported bugs in server software with implications for automated bug diagnosis
SK Sahoo, J Criswell, V Adve
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
902010
Silhouette: Efficient protected shadow stacks for embedded systems
J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls
29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020
662020
Memory Safety for Low-Level Software/Hardware Interactions.
J Criswell, N Geoffray, VS Adve
USENIX security symposium, 83-100, 2009
532009
Shielding Software From Privileged {Side-Channel} Attacks
X Dong, Z Shen, J Criswell, AL Cox, S Dwarkadas
27th USENIX Security Symposium (USENIX Security 18), 1441-1458, 2018
492018
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage
Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell
31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022
302022
Beating OPT with statistical clairvoyance and variable size caching
P Li, C Pronovost, W Wilson, B Tait, J Zhou, C Ding, J Criswell
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
302019
Inter-disciplinary research challenges in computer systems for the 2020s
A Cohen, X Shen, J Torrellas, J Tuck, Y Zhou, S Adve, I Akturk, S Bagchi, ...
National Science Foundation, 2018
302018
Codestitcher: inter-procedural basic block layout optimization
R Lavaee, J Criswell, C Ding
Proceedings of the 28th International Conference on Compiler Construction, 65-75, 2019
272019
Spectres, virtual ghosts, and hardware support
X Dong, Z Shen, J Criswell, A Cox, S Dwarkadas
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
262018
Restricting control flow during speculative execution
Z Shen, J Zhou, D Ojha, J Criswell
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
242018
Fast intra-kernel isolation and security with Iskios
S Gravani, M Hedayati, J Criswell, ML Scott
Proceedings of the 24th international symposium on research in attacks …, 2021
232021
A virtual instruction set interface for operating system kernels
J Criswell, B Monroe, V Adve
Workshop on the Interaction between Operating Systems and Computer …, 2006
212006
Baggy bounds with accurate checking
B Ding, Y He, Y Wu, A Miller, J Criswell
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
202012
系统目前无法执行此操作,请稍后再试。
文章 1–20