TUD Logo

TUD Startseite » ... » Publikationen » Nach Kategorien sortiert » Systemsicherheit

Betriebssysteme

Systemsicherheit

Veröffentlichungen sortiert nach verschieden Kategorien : 
[System Security] [Quality of Service] [Virtualization] [Microkernel Research] [Energy] [Misc]
[Dissertation] [Journal] [Conference] [Workshop] [Technical report] [Poster] [Misc.]

  • Sandcrust: Automatic Sandboxing of Unsafe Components in Rust
    Benjamin Lamowski, Carsten Weinhold, Adam Lackorzynski, Hermann Härtig
    9th Workshop on Programming Languages and Operating Systems (PLOS 2017), Shanghai, China, October 2017
    PDF
  • Improving System Security Through TCB Reduction
    Bernhard kauer
    Dissertation, Dresden, Germany, Dezember 2014
    PDF
  • Reducing Size and Complexity of the Security-Critical Code Base of File Systems
    Carsten Weinhold
    Dissertation, Dresden, Germany, January 2014
    PDF
  • jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components
    Carsten Weinhold and Hermann Härtig
    Proceedings of the 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 2011
    PDF
  • Provable Protection of Confidential Data in Microkernel-Based Systems
    Marcus Völp
    Dissertation, Dresden, Germany, January 2011
    PDF , Additional information , summary
  • Taming Subsystems - Capabilities as Universal Resource Access Control in L4
    Adam Lackorzynski, Alexander Warg
    IIES'09: Second Workshop on Isolation and Integration in Embedded Systems (Eurosys 2009 affiliated workshop) , March 2009
    PDF
  • Securing Graphical User Interface
    Norman Feske
    Dissertation, Dresden, Germany, January 2009
    PDF
  • VPFS: Building a Virtual Private File System with a Small Trusted Computing Base
    Carsten Weinhold, Hermann Härtig
    Proceedings of EuroSys 2008, Glasgow, Scotland, April 2008
    PDF
  • Statically Checking Confidentiality of Shared-Memory Programs with Dynamic Labels
    Marcus Völp
    The Third International Conference on Availability, Security and Reliability (ARES 2008), Barcelona, Spain, March 2008
    PDF
  • Avoiding Timing Channels in Fixed-Priority Schedules
    Marcus Völp and Claude-J. Hamann and Hermann Härtig
    ACM Symposium on Information, Computer and Communication Security (ASIACCS '08), Tokyo, Japan, March 2008
    PDF
  • Trusted Computing Serving an Anonymity Service
    Alexander Böttcher, Bernhard Kauer, Hermann Härtig
    Trusted Computing Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings Series: Lecture Notes in Computer Science , Vol. 4968, Springer, LNCS online, ISBN: 978-3-540-68978-2 , March 11-12, 2008
    PDF
  • Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow
    Lenin Singaravelu, Bernhard Kauer, Alexander Böttcher, Hermann Härtig, Calton Pu, Gueyoung Jung, Carsten Weinhold
    Technical Report, GeorgiaTec University, November 2007
    PDF
  • OSLO: Improving the security of Trusted Computing
    Bernhard Kauer
    Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007
    PDF
  • Design of the Bastei OS Architecture
    N. Feske, C. Helmuth
    TU Dresden technical report TUD-FI06-07, Dresden, Germany , December 2006
    PDF
  • Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
    Lenin Singaravelu (Georgia Tech), Calton Pu (Georgia Tech), Hermann Haertig (TU Dresden) and Christian Helmuth (TU Dresden)
    Proceedings of the First European Systems Conference (EuroSys 1), Leuven, Belgium , April 2006
    PDF
  • A Nitpicker's guide to a minimal-complexity secure GUI.
    N. Feske, C. Helmuth
    Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, USA , December 2005
    PDF
  • The Nizza Secure-System Architecture.
    H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, M. Peter
    Presented at The First International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2005), San Jose, California, USA , December 2005
    PDF
  • Mikro-SINA—Hands-on Experiences with the Nizza Security Architecture.
    C. Helmuth, A. Warg, and N. Feske
    Proceedings of the D.A.CH Security 2005, Darmstadt, Germany , March 2005
    PDF
  • Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors
    M. Hohmuth, M. Peter, H. Härtig, J. S. Shapiro
    Proceedings of the 11th ACM SIGOPS European Workshop (EW 2004), Leuven, Belgium , September 2004
    PDF
  • Overlay Window Management: User interaction with multiple security domains
    N. Feske, C. Helmuth
    TU Dresden technical report TUD-FI04-02, Dresden, Germany, March 2004
    PDF
  • An I/O Architecture for Mikrokernel-Based Operating Systems
    H. Härtig, J. Loeser, F. Mehnert, L. Reuther, M. Pohlack, A. Warg
    TU Dresden technical report TUD-FI03-08, Dresden, Germany, July 2003
    PDF
  • µSINA - Eine mikrokernbasierte Systemarchitektur für sichere Systemkomponenten
    C. Helmuth, A. Westfeld, M. Sobirey
    Bundesamt für Sicherheit in der Informationstechnik (Hrsg.): IT-Sicherheit im verteilten Chaos, Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI, S439-453, Secumedia-Verlag Ingelsheim Best paper award! , 2003
    PDF
  • Security Architectures Revisited
    H. Härtig
    Proceedings of the 10th ACM SIGOPS European Workshop (EW 2002), Saint-Emilion, France , September 2002
    PDF
  • Kapselung ausführbarer Binärdateien. slcaps: Implementierung von Capabilitys für Linux
    S. Lehmann, A. Westfeld
    In: Dirk Fox, Marit Köhntopp, Andreas Pfitzmann (Hrsg.): Verlässliche IT-Systeme 2001. Sicherheit in komplexen IT-Infrastrukturen, S. 21-35, DuD Fachbeiträge, Vieweg Braunschweig Wiesbaden , 2001
    PDF
  • Kapselung mobiler Programme
    L. Reuther, H. Härtig
    14. ITG/GI-Fachtagung Architektur von Rechensystemen ARCS '97 Rostock , September 1997
    PS
  • Encapsulating Mobile Objects
    H. Härtig, L. Reuther
    Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS), Baltimore, IEEE Computer Society Press, p. 355—362, Montreal, Canada , May 1997
    PS
  • The BirliX Security Architecture
    H. Härtig, O. Kowalski, W. Kühnhauser
    Journal of Computer Security 2, p. 5—21 , 1993
    PS
  • Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme
    M. Groß
    In: Verläßliche Informationssysteme, Proceedings der GI-Fachtagung VIS'91, Darmstadt, Informatik-Fachberichte Nr. 271, Springer-Verlag, Heidelberg, S. 190-207 , 1991
    PDF
Stand: 15.11.2017, 4:36 Uhr
Autor: Dr.-Ing. Carsten Weinhold

Kontakt
Dr.-Ing.
Carsten Weinhold

Tel.: 463 38056
Fax: 463 38284
E-Mail-Kontaktformular