|
System security
Publications sorted by various categories :
[System Security]
[Quality of Service]
[Virtualization]
[Microkernel Research]
[Energy]
[Misc]
[Dissertation]
[Journal]
[Conference]
[Workshop]
[Technical report]
[Poster]
[Misc.]
- Enabling and Optimizing MACsec for Industrial Environments (Extended Abstract)
Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig 16th IEEE International Conference on Factory Communication Systems (WFCS),
April 2020
HTML
- Sandcrust: Automatic Sandboxing of Unsafe Components in Rust
Benjamin Lamowski, Carsten Weinhold, Adam Lackorzynski, Hermann Härtig 9th Workshop on Programming Languages and Operating Systems (PLOS 2017), Shanghai, China,
October 2017
PDF
- Improving System Security Through TCB Reduction
Bernhard kauer Dissertation, Dresden, Germany,
Dezember 2014
PDF
- Reducing Size and Complexity of the Security-Critical Code Base of File Systems
Carsten Weinhold Dissertation, Dresden, Germany,
January 2014
PDF
- jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components
Carsten Weinhold and Hermann Härtig Proceedings of the 2011 USENIX Annual Technical Conference, Portland, OR, USA,
June 2011
PDF
- Provable Protection of Confidential Data in Microkernel-Based Systems
Marcus Völp Dissertation, Dresden, Germany,
January 2011
PDF
, Additional
information
,
summary
- Taming Subsystems - Capabilities as Universal Resource Access Control in L4
Adam Lackorzynski, Alexander Warg
IIES'09: Second Workshop on Isolation and Integration in Embedded Systems (Eurosys 2009 affiliated workshop)
,
March 2009
PDF
- Securing Graphical User Interface
Norman Feske Dissertation, Dresden, Germany,
January 2009
PDF
- VPFS: Building a Virtual Private File System with a Small Trusted Computing Base
Carsten Weinhold, Hermann Härtig Proceedings of EuroSys 2008, Glasgow, Scotland,
April 2008
PDF
- Statically Checking Confidentiality of Shared-Memory Programs with Dynamic Labels
Marcus Völp The Third International Conference on Availability, Security and Reliability (ARES 2008), Barcelona, Spain,
March 2008
PDF
- Avoiding Timing Channels in Fixed-Priority Schedules
Marcus Völp and Claude-J. Hamann and Hermann Härtig ACM Symposium on Information, Computer and Communication Security (ASIACCS '08), Tokyo, Japan,
March 2008
PDF
- Trusted Computing Serving an Anonymity Service
Alexander Böttcher, Bernhard Kauer, Hermann Härtig
Trusted Computing Challenges and Applications,
First International Conference on Trusted Computing and Trust in Information Technologies,
TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings Series:
Lecture Notes in Computer Science , Vol. 4968,
Springer, LNCS online,
ISBN: 978-3-540-68978-2
,
March 11-12, 2008
PDF
- Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow
Lenin Singaravelu, Bernhard Kauer, Alexander Böttcher, Hermann Härtig, Calton Pu, Gueyoung Jung, Carsten Weinhold Technical Report, GeorgiaTec University,
November 2007
PDF
- OSLO: Improving the security of Trusted Computing
Bernhard Kauer Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA,
August 6-10, 2007
PDF
- Design of the Bastei OS Architecture
N. Feske, C. Helmuth
TU Dresden technical report TUD-FI06-07, Dresden, Germany
,
December 2006
PDF
-
Reducing TCB Complexity for Security-Sensitive Applications:
Three Case Studies
Lenin Singaravelu (Georgia Tech), Calton Pu (Georgia Tech), Hermann
Haertig (TU Dresden) and Christian Helmuth (TU Dresden)
Proceedings of the First European Systems Conference (EuroSys 1),
Leuven, Belgium
,
April 2006
PDF
- A Nitpicker's guide to a minimal-complexity secure GUI.
N. Feske, C. Helmuth
Proceedings of the 21st Annual Computer Security Applications Conference
(ACSAC 2005),
Tucson, Arizona, USA
,
December 2005
PDF
- The Nizza Secure-System Architecture.
H. Härtig, M. Hohmuth, N. Feske, C. Helmuth,
A. Lackorzynski, F. Mehnert, M. Peter
Presented at The First International Conference on Collaborative
Computing: Networking, Applications and Worksharing
(CollaborateCom 2005),
San Jose, California, USA
,
December 2005
PDF
- Mikro-SINA—Hands-on Experiences with the Nizza Security Architecture.
C. Helmuth, A. Warg, and N. Feske
Proceedings of the
D.A.CH Security 2005,
Darmstadt, Germany
,
March 2005
PDF
- Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors
M. Hohmuth, M. Peter, H. Härtig, J. S. Shapiro
Proceedings of the 11th ACM SIGOPS European Workshop
(EW 2004),
Leuven, Belgium
,
September 2004
PDF
- Overlay Window Management: User interaction with multiple security domains
N. Feske, C. Helmuth TU Dresden technical report TUD-FI04-02, Dresden, Germany,
March 2004
PDF
- An I/O Architecture for Mikrokernel-Based Operating Systems
H. Härtig, J. Loeser, F. Mehnert, L. Reuther, M. Pohlack, A. Warg TU Dresden technical report TUD-FI03-08, Dresden, Germany,
July 2003
PDF
- µSINA - Eine mikrokernbasierte Systemarchitektur für sichere Systemkomponenten
C. Helmuth, A. Westfeld, M. Sobirey
Bundesamt für Sicherheit in der Informationstechnik (Hrsg.): IT-Sicherheit im verteilten Chaos,
Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI, S439-453, Secumedia-Verlag Ingelsheim
Best paper award!
,
2003
PDF
- Security Architectures Revisited
H. Härtig
Proceedings of the 10th ACM SIGOPS European Workshop
(EW 2002),
Saint-Emilion, France
,
September 2002
PDF
-
Kapselung ausführbarer Binärdateien.
slcaps: Implementierung von Capabilitys für Linux
S. Lehmann, A. Westfeld
In: Dirk Fox, Marit Köhntopp, Andreas Pfitzmann
(Hrsg.): Verlässliche IT-Systeme 2001. Sicherheit in komplexen
IT-Infrastrukturen, S. 21-35, DuD Fachbeiträge, Vieweg Braunschweig
Wiesbaden
,
2001
PDF
- Kapselung mobiler Programme
L. Reuther, H. Härtig
14. ITG/GI-Fachtagung Architektur von Rechensystemen ARCS '97 Rostock
,
September 1997
PS
- Encapsulating Mobile Objects
H. Härtig, L. Reuther
Proceedings of the 17th International Conference on
Distributed Computing Systems (ICDCS), Baltimore, IEEE Computer Society Press,
p. 355—362, Montreal, Canada
,
May 1997
PS
- The BirliX Security Architecture
H. Härtig, O. Kowalski, W. Kühnhauser
Journal of Computer Security 2, p. 5—21
,
1993
PS
- Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme
M. Groß
In: Verläßliche Informationssysteme, Proceedings der GI-Fachtagung VIS'91,
Darmstadt, Informatik-Fachberichte Nr. 271, Springer-Verlag, Heidelberg, S. 190-207
,
1991
PDF
|
|