L4 - Virtualization and Beyond |
Hartig, Hermann
(Technische Universitat Dresden)
Roitzsch, Michael (Technische Universitat Dresden) Bottcher, Alexander (Technische Universitat Dresden) Lackorzynski, Adam (Gesellschaft fur Wissens-und Technologietransfer der TU Dresden) Dobel, Bjorn (Gesellschaft fur Wissens-und Technologietransfer der TU Dresden) |
1 | M. Bushnell. Towards a New Strategy of OS Design. January 1994. |
2 | C. Helmuth, A. Warg, and N. Feske. Mikro-SINA -Hands-on Experiences with the Nizza Security Architecture. In Proceedings of the D.A.CH Security 2005, Darmstadt, Germany, Mar. 2005 |
3 | M. F. Kaashoek, D. R. Engler, G. R. Ganger, H. Briceno, R. Hunt, D. Mazieres, T. Pinckney, R. Grimm, and T. Pinckney. Application performance and flexibility on exokernel systems. In Proceedings of the 16th ACM Symposium on Operating System Principles(SOSP), Saint-Malo, France, Oct. 1997. |
4 | J. Sugerman, G. Venkitachalam, and B.-H. Lim. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor. In Proceedings of the 2001 USENIX Annual Technical Conference, General Track, pp. 1-14, Boston, Massachusetts, USA, June 2001 |
5 | A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systemserrors. In SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, pp. 73-88, New York, NY, USA, 2001. ACM. |
6 | A. Bottcher, B. Kauer, and H. Hartig. Trusted computing serving an anonymity service. Springer Lecture Notes in Computer Science, 4968:143-154, 2008. |
7 | M. J. Accetta, R. V. Baron, W. Bolosky, D. B. Golub, R. F. Rashid, A. Tevanian, and M. W. Young. Mach: A new kernel foundation for unix development. In USENIX Summer Conference, pp. 93-113, Atlanta, GA, June 1986. |
8 | J. Brakensiek, A. Droge, H. Hartig, A. Lackorzynski, and M. Botteck. Virtualization as an enabler for security in mobile devices. In Proceedings of the First Workshop on Isolation and Integration in Embedded Systems(IIES 2008), EuroSys 2008 Affiliated Workshop, pp. 17-22, Glasgow, Scotland, UK, April 2008. |
9 |
H. Hartig, M. Hohmuth, J. Liedtke, S. Schonberg, and J. Wolter. The performance of |
10 | J. Loser and H. Hartig. Real Time on Ethernet using off-the-shelf Hardware. In 1st Intl Workshop on Real-Time LANs in the Internet Age, Vienna, Austria, June 2002. |
11 | K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In ASPLOS-XII: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, pp. 2-13, New York, NY, USA, 2006. ACM. |
12 |
J. Liedtke. On |
13 | L. Singaravelu, C. Pu, H. Hartig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev., 40(4):, 2006 |
14 | A. Lackorzynksi. TUD:OS - the L4 SMP microkernel on ARM11 MPCore. http://www.youtube.com/watch?v=dWVfaZYkz-Y. |
15 | J. Liedtke. Improving IPC by kernel design. In Proceedings of the 14th ACM Symposium on Operating System Principles(SOSP), pp. 175-188, Asheville, NC, Dec. 1993. |
16 | Norman Feske and Christian Helmuth. A Nitpicker's guide to a minimal complexity secure GUI. In Proceedings of the 21st Annual Computer Security Applications Conference(ACSAC), 2005 |
17 | N. Feske and H. Härtig. Demonstration of DOpE - a Window Server for Real-Time and Embedded Systems. In 24th IEEE Real-Time Systems Symposium( RTSS), pp. 74-77, Cancun, Mexico, Dec. 2003. |
18 | C. Lattner and V. Adve. LLVM: a compilation framework for lifelong program analysis & transformation. Code Generation and Optimization, 2004. CGO 2004. International Symposium on, pp. 75-86, March 2004. |
19 | P. Brinch Hansen. The nucleus of a multiprogramming system. Commun. ACM, 13(4):238-241, Apr. 1970. DOI |
20 | L. Singaravelu, B. Kauer, A. Boettcher, H. Haertig, C. Pu, G. Jung, and C. Weinhold. Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow. Technical report, GeorgiaTec University, Nov. 2007 |
21 | J. LeVasseur, V. Uhlig, J. Stoess, and S. Gotz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, Berkeley, CA, USA, 2004. USENIX Association. |
22 | G. J. Popek and R. P. Goldberg. Formal requirements for virtualizable third generation architectures. Commun. ACM, 17(7):412-421, 1974 DOI ScienceOn |
23 | H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The nizza secure-system architecture. In IEEE Collaborate-Com 2005. IEEE Press, 2005. |
24 | G. C. Hunt and J. R. Larus. Singularity: rethinking the software stack. SIGOPS Oper. Syst. Rev., 41(2): 37-49, 2007 |
25 | C. Weinhold and H. Hartig. VPFS: building a virtual private file system with a small trusted computing base. SIGOPS Oper. Syst. Rev., 42(4):81-93, 2008 |
26 | P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating System Principles(SOSP), pp. 164-177, Bolton Landing, NY, Oct. 2003. |
27 | L. Reuther and M. Pohlack. Rotational-Position-Aware Real-Time Disk Scheduling Using a Dynamic Active Subset(DAS). In 24th IEEE Real-Time Systems Symposium(RTSS), pp. 374-385, Cancun, Mexico, Dec. 2003. |
![]() |