Nathan Dautenhahn

Orcid: 0000-0001-8456-6957

Affiliations:
  • Rice University, Department of Computer Science, Houston, TX, USA


According to our database1, Nathan Dautenhahn authored at least 27 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: Software Compartmentalization.
CoRR, 2024

Making 'syscall' a Privilege not a Right.
CoRR, 2024

Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling.
CoRR, 2023

Whole-Program Privilege and Compartmentalization Analysis with the Object-Encapsulation Model.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Endoprocess: Programmable and Extensible Subprocess Isolation.
Proceedings of the 2023 New Security Paradigms Workshop, 2023

Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

CIVSCOPE: Analyzing Potential Memory Corruption Bugs in Compartment Interfaces.
Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, 2023

2022
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software.
CoRR, 2022

2021
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization.
CoRR, 2021

Lossless instruction-to-object memory tracing in the Linux kernel.
Proceedings of the SYSTOR '21: The 14th ACM International Systems and Storage Conference, 2021

μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
The Design and Implementation of a Verified File System with End-to-End Data Integrity.
CoRR, 2020

DeepMatch: practical deep packet inspection in the data plane using network processors.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2018
MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

BreakApp: Automated, Flexible Application Compartmentalization.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Towards Fine-grained, Automated Application Compartmentalization.
Proceedings of the 9th Workshop on Programming Languages and Operating Systems, 2017

Deconstructing Xen.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Protection in commodity monolithic operating systems
PhD thesis, 2016

2015
Slipstream: Automatic Interprocess Communication Optimization.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Virtual ghost: protecting applications from hostile operating systems.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
QuickRec: prototyping an intel architecture extension for record and replay of multithreaded programs.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

Cyrus: unintrusive application-level record-replay for replay parallelism.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

2012
Using replicated execution for a more secure and reliable web browser.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Fortifying web-based applications automatically.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...