Follow
John Criswell
John Criswell
Verified email at cs.rochester.edu - Homepage
Title
Cited by
Cited by
Year
A predictable execution model for COTS-based embedded systems
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley
2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium …, 2011
3442011
KCoFI: Complete control-flow integrity for commodity operating system kernels
J Criswell, N Dautenhahn, V Adve
2014 IEEE symposium on security and privacy, 292-307, 2014
2782014
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
2232007
Virtual ghost: Protecting applications from hostile operating systems
J Criswell, N Dautenhahn, V Adve
ACM SIGARCH Computer Architecture News 42 (1), 81-96, 2014
1872014
Nested kernel: An operating system architecture for intra-kernel privilege separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
1792015
Hodor:{Intra-Process} isolation for {High-Throughput} data plane libraries
M Hedayati, S Gravani, E Johnson, J Criswell, ML Scott, K Shen, M Marty
2019 USENIX Annual Technical Conference (USENIX ATC 19), 489-504, 2019
1512019
Using likely invariants for automated software fault localization
SK Sahoo, J Criswell, C Geigle, V Adve
Proceedings of the eighteenth international conference on Architectural …, 2013
1262013
An empirical study of reported bugs in server software with implications for automated bug diagnosis
SK Sahoo, J Criswell, V Adve
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
902010
Memory Safety for Low-Level Software/Hardware Interactions.
J Criswell, N Geoffray, VS Adve
USENIX security symposium, 83-100, 2009
512009
Silhouette: Efficient protected shadow stacks for embedded systems
J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls
29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020
482020
Shielding Software From Privileged {Side-Channel} Attacks
X Dong, Z Shen, J Criswell, AL Cox, S Dwarkadas
27th USENIX Security Symposium (USENIX Security 18), 1441-1458, 2018
462018
Inter-disciplinary research challenges in computer systems for the 2020s
A Cohen, X Shen, J Torrellas, J Tuck, Y Zhou, S Adve, I Akturk, S Bagchi, ...
National Science Foundation, 2018
282018
Beating OPT with statistical clairvoyance and variable size caching
P Li, C Pronovost, W Wilson, B Tait, J Zhou, C Ding, J Criswell
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
262019
Spectres, virtual ghosts, and hardware support
X Dong, Z Shen, J Criswell, A Cox, S Dwarkadas
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
262018
A predictable execution model for COTS-based embedded systems. In 2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium
R Pellizzoni, E Betti, S Bak, G Yao, J Criswell, M Caccamo, R Kegley
Chicago, IL, USA, 269-279, 2011
262011
Codestitcher: inter-procedural basic block layout optimization
R Lavaee, J Criswell, C Ding
Proceedings of the 28th International Conference on Compiler Construction, 65-75, 2019
252019
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage
Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell
31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022
192022
A virtual instruction set interface for operating system kernels
J Criswell, B Monroe, V Adve
Workshop on the Interaction between Operating Systems and Computer …, 2006
192006
IskiOS: Lightweight defense against kernel-level code-reuse attacks
S Gravani, M Hedayati, J Criswell, ML Scott
arXiv preprint arXiv:1903.04654, 2019
172019
Baggy bounds with accurate checking
B Ding, Y He, Y Wu, A Miller, J Criswell
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20