Fast Protection-Domain Crossing in the CHERI Capability-System Architecture
暂无分享,去创建一个
Peter G. Neumann | Michael Roe | Robert N. M. Watson | Brooks Davis | Steven J. Murdoch | Robert M. Norton | Jonathan Anderson | Simon W. Moore | A. T. Markettos | Ben Laurie | Jonathan Woodruff | A. Theodore Markettos | David Chisnall | Khilan Gudka | Alexandre Joannou | Stacey D. Son | Nirav H. Dave | Ed Maste | Colin Rothwell | Munraj Vadera | B. Laurie | R. Watson | S. Murdoch | S. Moore | P. Neumann | Nirav H. Dave | D. Chisnall | Jonathan Woodruff | J. Anderson | M. Roe | Brooks Davis | Khilan Gudka | Alexandre Joannou | Robert M. Norton | Munraj Vadera | Ed Maste | Colin Rothwell | Jonathan Anderson
[1] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[2] George Neville-Neil,et al. The Design and Implementation of the FreeBSD Operating System , 2014 .
[3] Jonathan M. Smith,et al. Architectural Support for Software-Defined Metadata Processing , 2015, ASPLOS.
[4] Paul A. Karger,et al. Limiting the Damage Potential of Discretionary Trojan Horses , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] Robert N. M. Watson,et al. Capsicum: Practical Capabilities for UNIX , 2010, USENIX Security Symposium.
[6] Peter G. Neumann,et al. Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine , 2015, ASPLOS.
[7] William J. Dally,et al. Hardware support for fast capability-based addressing , 1994, ASPLOS VI.
[8] Maurice V. Wilkes,et al. The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .
[9] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[10] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[11] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[12] Robert N. M. Watson,et al. A taste of Capsicum , 2012, Commun. ACM.
[13] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[14] William A. Wulf,et al. HYDRA , 1974, Commun. ACM.
[15] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .
[16] Charles Reis,et al. Isolating web programs in modern browser architectures , 2009, EuroSys '09.
[17] Muli Ben-Yehuda,et al. CODOMs: Protecting software with Code-centric memory Domains , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[18] Michael Norrish,et al. seL4: formal verification of an operating-system kernel , 2010, Commun. ACM.
[19] Peter G. Neumann,et al. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization , 2015, 2015 IEEE Symposium on Security and Privacy.
[20] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.