TUD Logo

TUD Home » ... » Publications » Grouped by category » System Security

Operating Systems

System security

Publications sorted by various categories : 
[System Security] [Quality of Service] [Virtualization] [Microkernel Research] [Energy] [Misc]
[Dissertation] [Journal] [Conference] [Workshop] [Technical report] [Poster] [Misc.]

  • Enabling and Optimizing MACsec for Industrial Environments (Extended Abstract)
    Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig
    16th IEEE International Conference on Factory Communication Systems (WFCS), April 2020
  • Sandcrust: Automatic Sandboxing of Unsafe Components in Rust
    Benjamin Lamowski, Carsten Weinhold, Adam Lackorzynski, Hermann Härtig
    9th Workshop on Programming Languages and Operating Systems (PLOS 2017), Shanghai, China, October 2017
  • Improving System Security Through TCB Reduction
    Bernhard kauer
    Dissertation, Dresden, Germany, Dezember 2014
  • Reducing Size and Complexity of the Security-Critical Code Base of File Systems
    Carsten Weinhold
    Dissertation, Dresden, Germany, January 2014
  • jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components
    Carsten Weinhold and Hermann Härtig
    Proceedings of the 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 2011
  • Provable Protection of Confidential Data in Microkernel-Based Systems
    Marcus Völp
    Dissertation, Dresden, Germany, January 2011
    PDF , Additional information , summary
  • Taming Subsystems - Capabilities as Universal Resource Access Control in L4
    Adam Lackorzynski, Alexander Warg
    IIES'09: Second Workshop on Isolation and Integration in Embedded Systems (Eurosys 2009 affiliated workshop) , March 2009
  • Securing Graphical User Interface
    Norman Feske
    Dissertation, Dresden, Germany, January 2009
  • VPFS: Building a Virtual Private File System with a Small Trusted Computing Base
    Carsten Weinhold, Hermann Härtig
    Proceedings of EuroSys 2008, Glasgow, Scotland, April 2008
  • Statically Checking Confidentiality of Shared-Memory Programs with Dynamic Labels
    Marcus Völp
    The Third International Conference on Availability, Security and Reliability (ARES 2008), Barcelona, Spain, March 2008
  • Avoiding Timing Channels in Fixed-Priority Schedules
    Marcus Völp and Claude-J. Hamann and Hermann Härtig
    ACM Symposium on Information, Computer and Communication Security (ASIACCS '08), Tokyo, Japan, March 2008
  • Trusted Computing Serving an Anonymity Service
    Alexander Böttcher, Bernhard Kauer, Hermann Härtig
    Trusted Computing Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings Series: Lecture Notes in Computer Science , Vol. 4968, Springer, LNCS online, ISBN: 978-3-540-68978-2 , March 11-12, 2008
  • Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow
    Lenin Singaravelu, Bernhard Kauer, Alexander Böttcher, Hermann Härtig, Calton Pu, Gueyoung Jung, Carsten Weinhold
    Technical Report, GeorgiaTec University, November 2007
  • OSLO: Improving the security of Trusted Computing
    Bernhard Kauer
    Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007
  • Design of the Bastei OS Architecture
    N. Feske, C. Helmuth
    TU Dresden technical report TUD-FI06-07, Dresden, Germany , December 2006
  • Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
    Lenin Singaravelu (Georgia Tech), Calton Pu (Georgia Tech), Hermann Haertig (TU Dresden) and Christian Helmuth (TU Dresden)
    Proceedings of the First European Systems Conference (EuroSys 1), Leuven, Belgium , April 2006
  • A Nitpicker's guide to a minimal-complexity secure GUI.
    N. Feske, C. Helmuth
    Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, USA , December 2005
  • The Nizza Secure-System Architecture.
    H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, M. Peter
    Presented at The First International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2005), San Jose, California, USA , December 2005
  • Mikro-SINA—Hands-on Experiences with the Nizza Security Architecture.
    C. Helmuth, A. Warg, and N. Feske
    Proceedings of the D.A.CH Security 2005, Darmstadt, Germany , March 2005
  • Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors
    M. Hohmuth, M. Peter, H. Härtig, J. S. Shapiro
    Proceedings of the 11th ACM SIGOPS European Workshop (EW 2004), Leuven, Belgium , September 2004
  • Overlay Window Management: User interaction with multiple security domains
    N. Feske, C. Helmuth
    TU Dresden technical report TUD-FI04-02, Dresden, Germany, March 2004
  • An I/O Architecture for Mikrokernel-Based Operating Systems
    H. Härtig, J. Loeser, F. Mehnert, L. Reuther, M. Pohlack, A. Warg
    TU Dresden technical report TUD-FI03-08, Dresden, Germany, July 2003
  • µSINA - Eine mikrokernbasierte Systemarchitektur für sichere Systemkomponenten
    C. Helmuth, A. Westfeld, M. Sobirey
    Bundesamt für Sicherheit in der Informationstechnik (Hrsg.): IT-Sicherheit im verteilten Chaos, Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI, S439-453, Secumedia-Verlag Ingelsheim Best paper award! , 2003
  • Security Architectures Revisited
    H. Härtig
    Proceedings of the 10th ACM SIGOPS European Workshop (EW 2002), Saint-Emilion, France , September 2002
  • Kapselung ausführbarer Binärdateien. slcaps: Implementierung von Capabilitys für Linux
    S. Lehmann, A. Westfeld
    In: Dirk Fox, Marit Köhntopp, Andreas Pfitzmann (Hrsg.): Verlässliche IT-Systeme 2001. Sicherheit in komplexen IT-Infrastrukturen, S. 21-35, DuD Fachbeiträge, Vieweg Braunschweig Wiesbaden , 2001
  • Kapselung mobiler Programme
    L. Reuther, H. Härtig
    14. ITG/GI-Fachtagung Architektur von Rechensystemen ARCS '97 Rostock , September 1997
  • Encapsulating Mobile Objects
    H. Härtig, L. Reuther
    Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS), Baltimore, IEEE Computer Society Press, p. 355—362, Montreal, Canada , May 1997
  • The BirliX Security Architecture
    H. Härtig, O. Kowalski, W. Kühnhauser
    Journal of Computer Security 2, p. 5—21 , 1993
  • Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme
    M. Groß
    In: Verläßliche Informationssysteme, Proceedings der GI-Fachtagung VIS'91, Darmstadt, Informatik-Fachberichte Nr. 271, Springer-Verlag, Heidelberg, S. 190-207 , 1991
Last modified: 3rd Dec 2020, 10.51 AM
Author: Dr.-Ing. Carsten Weinhold

Carsten Weinhold

Phone: 463 38056
Fax: 463 38284
e-mail contact form