default search action
Nathan Dautenhahn
Person information
- affiliation: Rice University, Department of Computer Science, Houston, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Fangfei Yang, Bumjin Im, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Nathan Dautenhahn:
Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation. USENIX Security Symposium 2024 - [i6]Fangfei Yang, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Kelly Kaoudis, Nathan Dautenhahn:
Making 'syscall' a Privilege not a Right. CoRR abs/2406.07429 (2024) - [i5]Hugo Lefeuvre, Nathan Dautenhahn, David Chisnall, Pierre Olivier:
SoK: Software Compartmentalization. CoRR abs/2410.08434 (2024) - 2023
- [c19]Yi Chien, Vlad-Andrei Badoiu, Yudi Yang, Yuqian Huo, Kelly Kaoudis, Hugo Lefeuvre, Pierre Olivier, Nathan Dautenhahn:
CIVSCOPE: Analyzing Potential Memory Corruption Bugs in Compartment Interfaces. KISV@SOSP 2023: 33-40 - [c18]Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier:
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. NDSS 2023 - [c17]Fangfei Yang, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Nathan Dautenhahn:
Endoprocess: Programmable and Extensible Subprocess Isolation. NSPW 2023: 92-101 - [c16]Yudi Yang, Weijie Huang, Kelly Kaoudis, Nathan Dautenhahn:
Whole-Program Privilege and Compartmentalization Analysis with the Object-Encapsulation Model. SP (Workshops) 2023: 1-12 - [i4]Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng, Danfeng Yao:
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. CoRR abs/2306.02270 (2023) - 2022
- [i3]Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chien, Felipe Huici, Nathan Dautenhahn, Pierre Olivier:
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. CoRR abs/2212.12904 (2022) - 2021
- [c15]Nick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis, Mathias Payer, Adam Bates, Jonathan M. Smith, André DeHon, Nathan Dautenhahn:
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. RAID 2021: 296-311 - [c14]Nick Roessler, Yi Chien, Lucas Atayde, Peiru Yang, Imani Palmer, Lily Gray, Nathan Dautenhahn:
Lossless instruction-to-object memory tracing in the Linux kernel. SYSTOR 2021: 2:1-2:12 - [i2]Bumjin Im, Fangfei Yang, Chia-Che Tsai, Michael LeMay, Anjo Vahldiek-Oberwagner, Nathan Dautenhahn:
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization. CoRR abs/2108.03705 (2021) - 2020
- [c13]Joel Hypolite, John Sonchack, Shlomo Hershkop, Nathan Dautenhahn, André DeHon, Jonathan M. Smith:
DeepMatch: practical deep packet inspection in the data plane using network processors. CoNEXT 2020: 336-350 - [i1]Daniel W. Song, Konstantinos Mamouras, Ang Chen, Nathan Dautenhahn, Dan S. Wallach:
The Design and Implementation of a Verified File System with End-to-End Data Integrity. CoRR abs/2012.07917 (2020)
2010 – 2019
- 2018
- [c12]Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, André DeHon, Jonathan M. Smith:
BreakApp: Automated, Flexible Application Compartmentalization. NDSS 2018 - [c11]Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn:
MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. RAID 2018: 359-379 - 2017
- [c10]Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Jinming Li:
Deconstructing Xen. NDSS 2017 - [c9]Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, André DeHon, Jonathan M. Smith:
Towards Fine-grained, Automated Application Compartmentalization. PLOS@SOSP 2017: 43-50 - 2016
- [b1]Nathan Dautenhahn:
Protection in commodity monolithic operating systems. University of Illinois Urbana-Champaign, USA, 2016 - 2015
- [c8]Nathan Dautenhahn, Theodoros Kasampalis, Will Dietz, John Criswell, Vikram S. Adve:
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation. ASPLOS 2015: 191-206 - [c7]Will Dietz, Joshua Cranmer, Nathan Dautenhahn, Vikram S. Adve:
Slipstream: Automatic Interprocess Communication Optimization. USENIX ATC 2015: 431-443 - 2014
- [c6]John Criswell, Nathan Dautenhahn, Vikram S. Adve:
Virtual ghost: protecting applications from hostile operating systems. ASPLOS 2014: 81-96 - [c5]John Criswell, Nathan Dautenhahn, Vikram S. Adve:
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. IEEE Symposium on Security and Privacy 2014: 292-307 - 2013
- [c4]Nima Honarmand, Nathan Dautenhahn, Josep Torrellas, Samuel T. King, Gilles Pokam, Cristiano Pereira:
Cyrus: unintrusive application-level record-replay for replay parallelism. ASPLOS 2013: 193-206 - [c3]Gilles Pokam, Klaus Danne, Cristiano Pereira, Rolf Kassa, Tim Kranich, Shiliang Hu, Justin Emile Gottschlich, Nima Honarmand, Nathan Dautenhahn, Samuel T. King, Josep Torrellas:
QuickRec: prototyping an intel architecture extension for record and replay of multithreaded programs. ISCA 2013: 643-654 - 2012
- [c2]Hui Xue, Nathan Dautenhahn, Samuel T. King:
Using replicated execution for a more secure and reliable web browser. NDSS 2012 - 2011
- [c1]Shuo Tang, Nathan Dautenhahn, Samuel T. King:
Fortifying web-based applications automatically. CCS 2011: 615-626
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 01:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint