Browse > Article

L4 - Virtualization and Beyond  

Hartig, Hermann (Technische Universitat Dresden)
Roitzsch, Michael (Technische Universitat Dresden)
Bottcher, Alexander (Technische Universitat Dresden)
Lackorzynski, Adam (Gesellschaft fur Wissens-und Technologietransfer der TU Dresden)
Dobel, Bjorn (Gesellschaft fur Wissens-und Technologietransfer der TU Dresden)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bushnell. Towards a New Strategy of OS Design. January 1994.
2 C. Helmuth, A. Warg, and N. Feske. Mikro-SINA -Hands-on Experiences with the Nizza Security Architecture. In Proceedings of the D.A.CH Security 2005, Darmstadt, Germany, Mar. 2005
3 M. F. Kaashoek, D. R. Engler, G. R. Ganger, H. Briceno, R. Hunt, D. Mazieres, T. Pinckney, R. Grimm, and T. Pinckney. Application performance and flexibility on exokernel systems. In Proceedings of the 16th ACM Symposium on Operating System Principles(SOSP), Saint-Malo, France, Oct. 1997.
4 J. Sugerman, G. Venkitachalam, and B.-H. Lim. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor. In Proceedings of the 2001 USENIX Annual Technical Conference, General Track, pp. 1-14, Boston, Massachusetts, USA, June 2001
5 A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systemserrors. In SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, pp. 73-88, New York, NY, USA, 2001. ACM.
6 A. Bottcher, B. Kauer, and H. Hartig. Trusted computing serving an anonymity service. Springer Lecture Notes in Computer Science, 4968:143-154, 2008.
7 M. J. Accetta, R. V. Baron, W. Bolosky, D. B. Golub, R. F. Rashid, A. Tevanian, and M. W. Young. Mach: A new kernel foundation for unix development. In USENIX Summer Conference, pp. 93-113, Atlanta, GA, June 1986.
8 J. Brakensiek, A. Droge, H. Hartig, A. Lackorzynski, and M. Botteck. Virtualization as an enabler for security in mobile devices. In Proceedings of the First Workshop on Isolation and Integration in Embedded Systems(IIES 2008), EuroSys 2008 Affiliated Workshop, pp. 17-22, Glasgow, Scotland, UK, April 2008.
9 H. Hartig, M. Hohmuth, J. Liedtke, S. Schonberg, and J. Wolter. The performance of $\mu$-kernel-based systems. In Proceedings of the 16th ACM Symposium on Operating System Principles(SOSP), pp. 66-77, Saint-Malo, France, Oct. 1997.
10 J. Loser and H. Hartig. Real Time on Ethernet using off-the-shelf Hardware. In 1st Intl Workshop on Real-Time LANs in the Internet Age, Vienna, Austria, June 2002.
11 K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In ASPLOS-XII: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, pp. 2-13, New York, NY, USA, 2006. ACM.
12 J. Liedtke. On $\mu$-kernel construction. In Proceedings of the 15th ACM Symposium on Operating System Principles(SOSP), pp. 237-250, Copper Mountain Resort, CO, Dec. 1995
13 L. Singaravelu, C. Pu, H. Hartig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev., 40(4):, 2006
14 A. Lackorzynksi. TUD:OS - the L4 SMP microkernel on ARM11 MPCore. http://www.youtube.com/watch?v=dWVfaZYkz-Y.
15 J. Liedtke. Improving IPC by kernel design. In Proceedings of the 14th ACM Symposium on Operating System Principles(SOSP), pp. 175-188, Asheville, NC, Dec. 1993.
16 Norman Feske and Christian Helmuth. A Nitpicker's guide to a minimal complexity secure GUI. In Proceedings of the 21st Annual Computer Security Applications Conference(ACSAC), 2005
17 N. Feske and H. Härtig. Demonstration of DOpE - a Window Server for Real-Time and Embedded Systems. In 24th IEEE Real-Time Systems Symposium( RTSS), pp. 74-77, Cancun, Mexico, Dec. 2003.
18 C. Lattner and V. Adve. LLVM: a compilation framework for lifelong program analysis & transformation. Code Generation and Optimization, 2004. CGO 2004. International Symposium on, pp. 75-86, March 2004.
19 P. Brinch Hansen. The nucleus of a multiprogramming system. Commun. ACM, 13(4):238-241, Apr. 1970.   DOI
20 L. Singaravelu, B. Kauer, A. Boettcher, H. Haertig, C. Pu, G. Jung, and C. Weinhold. Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow. Technical report, GeorgiaTec University, Nov. 2007
21 J. LeVasseur, V. Uhlig, J. Stoess, and S. Gotz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, Berkeley, CA, USA, 2004. USENIX Association.
22 G. J. Popek and R. P. Goldberg. Formal requirements for virtualizable third generation architectures. Commun. ACM, 17(7):412-421, 1974   DOI   ScienceOn
23 H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The nizza secure-system architecture. In IEEE Collaborate-Com 2005. IEEE Press, 2005.
24 G. C. Hunt and J. R. Larus. Singularity: rethinking the software stack. SIGOPS Oper. Syst. Rev., 41(2): 37-49, 2007
25 C. Weinhold and H. Hartig. VPFS: building a virtual private file system with a small trusted computing base. SIGOPS Oper. Syst. Rev., 42(4):81-93, 2008
26 P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating System Principles(SOSP), pp. 164-177, Bolton Landing, NY, Oct. 2003.
27 L. Reuther and M. Pohlack. Rotational-Position-Aware Real-Time Disk Scheduling Using a Dynamic Active Subset(DAS). In 24th IEEE Real-Time Systems Symposium(RTSS), pp. 374-385, Cancun, Mexico, Dec. 2003.