U Steinberg, B Kauer - Proceedings of the 5th European conference on …, 2010 - dl.acm.org
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve …
Attacks that exploit out-of-bounds errors in C and C++ programs are still prevalent despite many years of research on bounds checking. Previous backwards compatible bounds …
When separately written programs are composed so that they may cooperate, they may instead destructively interfere in unanticipated ways. These hazards limit the scale and …
This technical report describes CHERI ISAv7, the seventh version of the Capability Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA) being …
JN Herder, H Bos, B Gras, P Homburg… - ACM SIGOPS …, 2006 - dl.acm.org
Different kinds of people use computers now than several decades ago, but operating systems have not fully kept pace with this change. It is true that we have point-and-click GUIs …
Make Least Privilege a Right (Not a Privilege) Page 1 Make Least Privilege a Right (Not a Privilege) Maxwell Krohn⁄, Petros Efstathopoulosy, Cliff Frey⁄, Frans Kaashoek⁄, Eddie …
Abstract Systems that enforce memory safety for today's operating system kernels and other system software do not account for the behavior of low-level software/hardware interactions …
The quality of today's main-stream operating systems is not sufficient for safety-critical and security-critical applications. In this paper we discuss several possible approaches to build …
The Principle of Least Privilege suggests that software should be executed with no more authority than it requires to accomplish its task. Current security tools make it difficult to apply …