Author:
Chen Haogang,Mao Yandong,Wang Xi,Zhou Dong,Zeldovich Nickolai,Kaashoek M. Frans
Cited by
66 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mitigation of privilege escalation attack using kernel data relocation mechanism;International Journal of Information Security;2024-07-25
2. Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs;Proceedings of the ACM on Software Engineering;2024-07-12
3. A RISC-V On-chip Operating System Based on Rust;2023 9th International Conference on Computer and Communications (ICCC);2023-12-08
4. Remote attestation of confidential VMs using ephemeral vTPMs;Annual Computer Security Applications Conference;2023-12-04
5. Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15