A predictable execution model for COTS-based embedded systems R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley 2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium …, 2011 | 371 | 2011 |
KCoFI: Complete control-flow integrity for commodity operating system kernels J Criswell, N Dautenhahn, V Adve 2014 IEEE symposium on security and privacy, 292-307, 2014 | 299 | 2014 |
Secure virtual architecture: A safe execution environment for commodity operating systems J Criswell, A Lenharth, D Dhurjati, V Adve Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 227 | 2007 |
Nested kernel: An operating system architecture for intra-kernel privilege separation N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve Proceedings of the Twentieth International Conference on Architectural …, 2015 | 195 | 2015 |
Virtual ghost: Protecting applications from hostile operating systems J Criswell, N Dautenhahn, V Adve ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014 | 192 | 2014 |
Hodor:{Intra-Process} isolation for {High-Throughput} data plane libraries M Hedayati, S Gravani, E Johnson, J Criswell, ML Scott, K Shen, M Marty 2019 USENIX Annual Technical Conference (USENIX ATC 19), 489-504, 2019 | 185 | 2019 |
Using likely invariants for automated software fault localization SK Sahoo, J Criswell, C Geigle, V Adve Proceedings of the eighteenth international conference on Architectural …, 2013 | 132 | 2013 |
An empirical study of reported bugs in server software with implications for automated bug diagnosis SK Sahoo, J Criswell, V Adve Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010 | 90 | 2010 |
Silhouette: Efficient protected shadow stacks for embedded systems J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls 29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020 | 66 | 2020 |
Memory Safety for Low-Level Software/Hardware Interactions. J Criswell, N Geoffray, VS Adve USENIX security symposium, 83-100, 2009 | 53 | 2009 |
Shielding Software From Privileged {Side-Channel} Attacks X Dong, Z Shen, J Criswell, AL Cox, S Dwarkadas 27th USENIX Security Symposium (USENIX Security 18), 1441-1458, 2018 | 49 | 2018 |
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell 31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022 | 30 | 2022 |
Beating OPT with statistical clairvoyance and variable size caching P Li, C Pronovost, W Wilson, B Tait, J Zhou, C Ding, J Criswell Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019 | 30 | 2019 |
Inter-disciplinary research challenges in computer systems for the 2020s A Cohen, X Shen, J Torrellas, J Tuck, Y Zhou, S Adve, I Akturk, S Bagchi, ... National Science Foundation, 2018 | 30 | 2018 |
Codestitcher: inter-procedural basic block layout optimization R Lavaee, J Criswell, C Ding Proceedings of the 28th International Conference on Compiler Construction, 65-75, 2019 | 27 | 2019 |
Spectres, virtual ghosts, and hardware support X Dong, Z Shen, J Criswell, A Cox, S Dwarkadas Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 26 | 2018 |
Restricting control flow during speculative execution Z Shen, J Zhou, D Ojha, J Criswell Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 24 | 2018 |
Fast intra-kernel isolation and security with Iskios S Gravani, M Hedayati, J Criswell, ML Scott Proceedings of the 24th international symposium on research in attacks …, 2021 | 23 | 2021 |
A virtual instruction set interface for operating system kernels J Criswell, B Monroe, V Adve Workshop on the Interaction between Operating Systems and Computer …, 2006 | 21 | 2006 |
Baggy bounds with accurate checking B Ding, Y He, Y Wu, A Miller, J Criswell 2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012 | 20 | 2012 |