John Criswell
John Criswell
Verified email at cs.rochester.edu - Homepage
Title
Cited by
Cited by
Year
A predictable execution model for COTS-based embedded systems
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley
2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium …, 2011
1972011
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE Symposium on Security and Privacy, 292-307, 2014
1752014
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
1742007
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1262014
Using likely invariants for automated software fault localization
SK Sahoo, J Criswell, C Geigle, V Adve
Proceedings of the eighteenth international conference on Architectural …, 2013
832013
Nested kernel: An operating system architecture for intra-kernel privilege separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
822015
An empirical study of reported bugs in server software with implications for automated bug diagnosis
SK Sahoo, J Criswell, V Adve
2010 ACM/IEEE 32nd International Conference on Software Engineering 1, 485-494, 2010
652010
Memory Safety for Low-Level Software/Hardware Interactions.
J Criswell, N Geoffray, VS Adve
USENIX Security Symposium, 83-100, 2009
392009
A virtual instruction set interface for operating system kernels
J Criswell, B Monroe, V Adve
Workshop on the Interaction between Operating Systems and Computer …, 2006
162006
Spectres, virtual ghosts, and hardware support
X Dong, Z Shen, J Criswell, A Cox, S Dwarkadas
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
142018
Hodor: Intra-process isolation for high-throughput data plane libraries
M Hedayati, S Gravani, E Johnson, J Criswell, ML Scott, K Shen, M Marty
2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 489-504, 2019
132019
Shielding software from privileged side-channel attacks
X Dong, Z Shen, J Criswell, AL Cox, S Dwarkadas
27th {USENIX} Security Symposium ({USENIX} Security 18), 1441-1458, 2018
132018
Baggy bounds with accurate checking
B Ding, Y He, Y Wu, A Miller, J Criswell
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
92012
Beating OPT with statistical clairvoyance and variable size caching
P Li, C Pronovost, W Wilson, B Tait, J Zhou, C Ding, J Criswell
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
52019
Flexible and efficient memory object metadata
Z Liu, J Criswell
ACM Sigplan Notices 52 (9), 36-46, 2017
52017
Predictable execution model: concept and implementation
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo
52010
IskiOS: Lightweight defense against kernel-level code-reuse attacks
S Gravani, M Hedayati, J Criswell, ML Scott
arXiv preprint arXiv:1903.04654, 2019
42019
Interdisciplinary research challenges in computer systems for the 2020s
A Cohen, X Shen, J Torrellas, J Tuck, Y Zhou, S Adve, I Akturk, S Bagchi, ...
USA, Tech. Rep., 2018
42018
Secure virtual architecture: security for commodity software systems
J Criswell
University of Illinois at Urbana-Champaign, 2014
42014
Janus: Intra-process isolation for high-throughput data plane libraries
M Hedayati, S Gravani, E Johnson, J Criswell, M Scott, K Shen, M Marty
Technical Report UR CSD/1004, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20