Secure virtual architecture: security for commodity software systems

John T Criswell
University of Illinois at Urbana-Champaign

5
2014
Memory safety for low-level software/hardware interactions

Nicolas Geoffray , Vikram Adve , John Criswell
usenix security symposium 83 -100

30
2009
Predictable Execution Model: Concept and Implementation

Rodolfo Pellizzoni , Marco Caccamo , Stanley Bak , Emiliano Betti

2
2010
Shielding Software From Privileged Side-Channel Attacks

Sandhya Dwarkadas , John Criswell , Alan L. Cox , Xiaowan Dong
usenix security symposium 1441 -1458

17
2018
Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries

Mohammad Hedayati , Spyridoula Gravani , Ethan Johnson , John Criswell
usenix annual technical conference 489 -504

35
2019
Hardware Vulnerability and Mitigation Survey

John Criswell , Ethan Johnson , Komail Dharsee

2
2017
Silhouette: Efficient Protected Shadow Stacks for Embedded Systems

Robert J. Walls , John Criswell , Zhuojia Shen , Jie Zhou
usenix security symposium 1219 -1236

2
2020
Beating OPT with Statistical Clairvoyance and Variable Size Caching

Pengcheng Li , Colin Pronovost , William Wilson , Benjamin Tait
architectural support for programming languages and operating systems 243 -256

7
2019
A Predictable Execution Model for COTS-Based Embedded Systems

Rodolfo Pellizzoni , Emiliano Betti , Stanley Bak , Gang Yao
real time technology and applications symposium 269 -279

314
2011
Codestitcher: inter-procedural basic block layout optimization

Rahman Lavaee , John Criswell , Chen Ding
compiler construction 65 -75

3
2019
Restricting Control Flow During Speculative Execution

Zhuojia Shen , Jie Zhou , Divya Ojha , John Criswell
computer and communications security 2297 -2299

1
2018
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use

John Criswell , Jie Zhou , Spyridoula Gravani , Xiaoyu Hu
dependable systems and networks 593 -604

2019
Virtual ghost: protecting applications from hostile operating systems

John Criswell , Nathan Dautenhahn , Vikram Adve
architectural support for programming languages and operating systems 42 ( 1) 81 -96

180
2014
Baggy Bounds with Accurate Checking

Baozeng Ding , Yeping He , Yanjun Wu , Alex Miller
2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops 195 -200

11
2012
Fast Execute-Only Memory for Embedded Systems

Zhuojia Shen , Komail Dharsee , John Criswell
2020 IEEE Secure Development (SecDev) 7 -14

2020
Refactoring the FreeBSD Kernel with Checked C

Junhan Duan , Yudi Yang , Jie Zhou , John Criswell
2020 IEEE Secure Development (SecDev) 15 -22

2020
A Software Solution for Hardware Vulnerabilities

Komail Dharsee , Ethan Johnson , John Criswell
2017 IEEE Cybersecurity Development (SecDev) 27 -33

3
2017
Transforming Code to Drop Dead Privileges

Xiaoyu Hu , Jie Zhou , Spyridoula Gravani , John Criswell
2018 IEEE Cybersecurity Development (SecDev) 45 -52

1
2018
Spectres, virtual ghosts, and hardware support

Xiaowan Dong , Zhuojia Shen , John Criswell , Alan Cox
hardware and architectural support for security and privacy 5

10
2018
Secure guest virtual machine support in apparition

Ethan Johnson , Komail Dharsee , John Criswell
virtual execution environments 17 -30

2019