Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 137
41.
  • First steps in verifying th... First steps in verifying the seL4 Core Platform
    Paturel, Mathieu; Subasinghe, Isitha; Heiser, Gernot Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems, 08/2023
    Conference Proceeding
    Odprti dostop

    We report on our initial effort to formally verify the seL4 Core Platform, an OS framework for the verified seL4 microkernel. This includes a formal specification of the seL4 Core Platform library, ...
Celotno besedilo
Dostopno za: NUK, UL
42.
  • Hardware-supported virtuali... Hardware-supported virtualization on ARM
    Varanasi, Prashant; Heiser, Gernot Proceedings of the Second Asia-Pacific Workshop on Systems, 07/2011
    Conference Proceeding

    ARM is the dominant processor architecture for mobile devices and many other high-end embedded systems. Late last year ARM announced architectural support for virtualization, which will allow ...
Celotno besedilo
Dostopno za: NUK, UL
43.
Celotno besedilo
Dostopno za: NUK, UL
44.
Celotno besedilo
Dostopno za: NUK, UL
45.
  • The Jury Is In The Jury Is In
    Biggs, Simon; Lee, Damon; Heiser, Gernot Proceedings of the 9th Asia-Pacific Workshop on Systems, 08/2018
    Conference Proceeding

    The security benefits of keeping a system's trusted computing base (TCB) small has long been accepted as a truism, as has the use of internal protection boundaries for limiting the damage caused by ...
Celotno besedilo
Dostopno za: NUK, UL
46.
  • Can We Put the "S" Into IoT?
    Heiser, Gernot; Parker, Lucy; Chubb, Peter ... 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), 2022-Oct.-26
    Conference Proceeding

    Security of IoT systems is often weak or absent, resulting in systems being compromised. We present the seL4 Core Platform, an operating-system framework that leverages the formally verified security ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
47.
  • Can We Prove Time Protection? Can We Prove Time Protection?
    Heiser, Gernot; Klein, Gerwin; Murray, Toby Proceedings of the Workshop on Hot Topics in Operating Systems, 05/2019
    Conference Proceeding

    Timing channels are a significant and growing security threat in computer systems, with no established solution. We have recently argued that the OS must provide time protection, in analogy to the ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
48.
  • Mobile multicores Mobile multicores
    Carroll, Aaron; Heiser, Gernot Proceedings of the Workshop on Power-Aware Computing and Systems, 11/2013
    Conference Proceeding

    Energy management is a primary consideration in the design of modern smartphones, made more interesting by the recent proliferation of multi-core processors in this space. We investigate how core ...
Celotno besedilo
Dostopno za: NUK, UL
49.
  • AutoCC: Automatic Discovery... AutoCC: Automatic Discovery of Covert Channels in Time-Shared Hardware
    Orenes-Vera, Marcelo; Yun, Hyunsung; Wistoff, Nils ... Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 10/2023
    Conference Proceeding
    Odprti dostop

    Covert channels enable information leakage between security domains that should be isolated by observing execution differences in shared hardware. These channels can appear in any stateful shared ...
Celotno besedilo
Dostopno za: NUK, UL
50.
  • AutoCC : Automatic discovery of Covert Channels in Time-shared Hardware
    Orenes-Vera, Marcelo; Yun, Hyunsung; Wistoff, Nils ... 2023 56th IEEE/ACM International Symposium on Microarchitecture (MICRO), 2023-Oct.-28
    Conference Proceeding

    Covert channels enable information leakage between security domains that should be isolated by observing execution differences in shared hardware. These channels can appear in any stateful shared ...
Celotno besedilo
3 4 5 6 7
zadetkov: 137

Nalaganje filtrov