Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Nathan Dautenhahn"'
Autor:
Nick Roessler, Nathan Dautenhahn, Peiru Yang, Lily Gray, Imani Palmer, Lucas Atayde, Yi Chien
Publikováno v:
SYSTOR
The lack of visibility into Linux's behavior makes it hard to refactor and maintain. To peer inside the box, we present Memorizer, a self-contained, low-level tracing framework that tracks (most) object allocations, data accesses, and function calls
Autor:
André DeHon, Shlomo Hershkop, John Sonchack, Joel Hypolite, Nathan Dautenhahn, Jonathan M. Smith
Publikováno v:
CoNEXT
Restricting data plane processing to packet headers precludes analysis of payloads to improve routing and security decisions. DeepMatch delivers line-rate regular expression matching on payloads using Network Processors (NPs). It further supports pac
Publikováno v:
NDSS
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783030004699
RAID
RAID
In this work we present, MicroStache, a specialized hardware mechanism and new process abstraction for accelerating safe region security solutions. In the safe region paradigm, an application is split into safe and unsafe parts. Unfortunately, freque
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d79e5b5c80a529164bca951e7d3bb15d
https://doi.org/10.1007/978-3-030-00470-5_17
https://doi.org/10.1007/978-3-030-00470-5_17
Publikováno v:
ASPLOS
Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the kernel to enjoy full supervisor privilege. The nested kernel operating system architecture addresses this problem by "nesting"
Publikováno v:
PLOS@SOSP
The rise of language-specific, third-party packages simplifies application development. However, relying on untrusted code poses a threat to security and reliability.In this work, we propose exploiting module boundaries --and the general trend toward
Autor:
Lei Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li
Publikováno v:
Proceedings 2017 Network and Distributed System Security Symposium.
Publikováno v:
ASPLOS
Applications that process sensitive data can be carefully designed and validated to be difficult to attack, but they are usually run on monolithic, commodity operating systems, which may be less secure. An OS compromise gives the attacker complete ac
Autor:
Cristiano Pereira, Justin Gottschlich, Gilles Pokam, Rolf Kassa, Nima Honarmand, Josep Torrellas, Tim Kranich, Shiliang Hu, Klaus Danne, Nathan Dautenhahn, Samuel T. King
Publikováno v:
ISCA
There has been significant interest in hardware-assisted deterministic Record and Replay (RnR) systems for multithreaded programs on multiprocessors. However, no proposal has implemented this technique in a hardware prototype with full operating syst
Publikováno v:
IEEE Symposium on Security and Privacy
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integrity protection for commodity operating systems without using heavyweight complete memory safety. Unlike previous systems, KCoFI protects commodity ope