- [Adams and Agesen,
2006]
- Keith Adams and Ole Agesen.
A comparison of software and
hardware techniques for x86 virtualization.
In Proc. 12th Int'l Conf. on Architectural Support for Programming
Languages and Operating Systems, San Jose, California, USA, October
2006.
- [Adya et al., 2002]
- Atul Adya,
William J. Bolosky, Miguel Castro,
Gerald Cermak, Ronnie Chaiken,
John R. Douceur, Jon Howell,
Jacob R. Lorch, Marvin Theimer, and
Roger R. Wattenhofer.
FARSITE: Federated, available, and reliable storage for an incompletely
trusted environment.
In Proc. 5th Symposium on Operating Systems Design and
Implementations, Boston, MA, December 2002.
(PDF, 226817 bytes)
- [Amani et al.,
2016]
- Sidney Amani, Alex Hixon,
Zilin Chen, Christine Rizkallah,
Peter Chubb, Liam O'Connor, Joel
Beeren, Yutaka Nagashima, Japheth Lim,
Thomas Sewell, Joseph Tuong,
Gabriele Keller, Toby Murray,
Gerwin Klein, and Gernot Heiser.
Cogent: Verifying high-assurance file system implementations.
In Int'l Conf. on Architectural Support for Programming Languages and
Operating Systems, pages 175–188, Atlanta, GA, USA, April 2016.
(doi:10.1145/2872362.2872404)
- [Anderson, 1990]
- Thomas
Anderson.
The performance of spin lock alternatives for shared-memory multiprocessors.
IEEE Transactions on Parallel and Distributed Systems, 1(1),
1990.
- [Arbaugh et al.,
1997]
- William A. Arbaugh, David J.
Farber, and Jonathan M. Smith.
A secure and reliable bootstrap architecture.
In IEEE Symposium on Security and Privacy, pages 65–71, 1997.
(PDF, 689304 bytes)
- [Baker et al., 1991]
- Mary G.
Baker, John H. Hartman, Michael D. Kupfer,
Ken W. Shirriff, and John K. Ousterhout.
Measurements of a distributed file system.
In Proc. 13th Symp. on Operating Systems Principles, Pacific
Grove, CA, October 1991. ACM.
- [Barham et al.,
2003]
- Paul Barham, Boris Dragovic,
Keir Fraser, Steven Hand, Tim
Harris, Alex Ho, Rolf Neugebauer,
Ian Pratt, and Andrew Warfield.
Xen and the art of virtualization.
In Proc. 19th Symp. on Operating Systems Principles, pages
164–177, Bolton Landing, NY, USA, October 2003.
- [Bell and LaPadula,
1976]
- D.E. Bell and L.J. LaPadula.
Secure computer system: Unified exposition and Multics interpretation.
Technical Report MTR-2997, MITRE Corp., March 1976.
- [Ben-Yehuda et al.,
2010]
- Muli Ben-Yehuda, Michael D.
Day, Zvi Dubitzky, Michael Factor,
Nadav Har'El, Abel Gordon,
Anthony Liguori, Orit Wasserman, and
Ben-Ami Yassour.
The turtles project: Design and implementation of nested virtualization.
In Proceedings of 9th USENIX Symposium on Opearting Systems Design and
Implementation, Vancouver, BC, Canada, 2010.
(PDF, 259581 bytes)
- [Ben-Yehuday et al.,
2010]
- Muli Ben-Yehuday, Michael D.
Dayz, Zvi Dubitzkyy, Michael Factory,
Nadav Har'El, Abel Gordony,
Anthony Liguoriz, Orit Wassermany, and
Ben-Ami Yassour.
The Turtles project: Design and implementation of nested virtualization.
In Symposium on Operating Systems Design and Implementations,
Vancouver, BC, Canada, October 2010.
- [Bershad, 1992]
- Brian N.
Bershad.
The increasing irrelevance of IPC performance for microkernel-based operating
systems.
In Proc. USENIX WS Microkernels & other Kernel Arch., pages
205–211, Seattle, WA, USA, April 1992.
- [Biggs et al., 2018]
- Simon
Biggs, Damon Lee, and Gernot Heiser.
The jury is in: Monolithic OS design is flawed.
In Asia-Pacific Workshop on Systems (APSys), Korea, August 2018.
ACM SIGOPS.
(doi:https://doi.org/10.1145/3265723.3265733)
- [Blackham and Heiser,
2012]
- Bernard Blackham and Gernot
Heiser.
Correct,
fast, maintainable – choose any three!.
In Proc. 3rd Asia-Pacific Workshop on Systems (APSys), Seoul,
Korea, July 2012.
- [Blackham et al.,
2011]
- Bernard Blackham, Yao Shi,
Sudipta Chattopadhyay, Abhik Roychoudhury, and
Gernot Heiser.
Timing analysis of a protected operating system kernel.
In Proc. Real-Time Systems Symposium, Vienna, Austria, November
2011.
(PDF, 253090 bytes)
- [Blackham et al.,
2012]
- Bernard Blackham, Yao Shi,
and Gernot Heiser.
Improving interrupt response time in a verifiable protected microkernel.
In EuroSys Conference, pages 323–336, Bern, Switzerland, April
2012.
(doi:10.1145/2168836.2168869)
- [Blackham et al.,
2012]
- Bernard Blackham, Vernon
Tang, and Gernot Heiser.
To
preempt or not to preempt, that is the question.
In Proc. 3rd Asia-Pacific Workshop on Systems (APSys), Seoul,
Korea, July 2012.
- [Bos, 2019]
- Herbert Bos.
The
Cyber Security Body of Knowledge, chapter Operating Systems &
Virtualisation.
University of Bristol, 2019.
Version 1.0.
- [Brinch Hansen,
1970]
- Per Brinch Hansen.
The nucleus of a multiprogramming operating system.
Communications of the ACM, 13:238–250, 1970.
- [Chen and Bershad,
1993]
- J. Bradley Chen and Brian N.
Bershad.
The impact of operating system structure on memory system performance.
In Proc. Symp. on Operating Systems Principles, pages 120–133,
Asheville, NC, USA, December 1993.
(PDF, 1523803 bytes)
- [Chen et al.,
2008]
- Xiaoxin Chen, Tal Garfinkel,
E. Christopher Lewis, Pratap Subrahmanyam,
Carl A. Waldspurger, Dan Boneh,
Jeffrey Dwoskin, and Dan R.K. Ports.
Overshadow: A virtualization-based approach to retrofitting protection in
commodity operating systems.
In Int'l Conf. on Architectural Support for Programming Languages and
Operating Systems, Seattle, WA, USA, March 2008.
- [Clark and Emer,
1985]
- Douglas W. Clark and Joel S.
Emer.
Performance of the
VAX-11/780 translation buffer: Simulation and measurement.
ACM Transactions on Computer Systems, 3:31–62, 1985.
- [Clements et al.,
2013]
- Austin T. Clements, M. Frans
Kaashoek, and Nickolai Zeldovich.
RadixVM: Scalable address spaces for multithreaded applications.
In EuroSys Conference, Prague, Czech, April 2013.
- [Coulouris et al.,
1994]
- George F. Coulouris, Jean
Dollimore, and Tim Kindberg.
Distributed Systems: Concepts and Design.
Addison-Wesley, 2nd edition, 1994.
- [Custer, 1993]
- Helen
Custer.
Inside Windows-NT.
Microsoft, 1993.
- [Dall and Nieh,
2014]
- Christoffer Dall and Jason
Nieh.
KVM/ARM: The design and implementation of the Linux ARM hypervisor.
In Int'l Conf. on Architectural Support for Programming Languages and
Operating Systems, pages 333–347, Salt Lake City, UT, USA, March
2014.
- [Dean and Armand,
1992]
- Randall W. Dean and Francois
Armand.
Data movement in kernelized systems.
In Proc. USENIX WS Microkernels & other Kernel Arch., pages
243–261, Seattle, WA, USA, April 1992.
- [Dennis and Van Horn,
1966]
- Jack B. Dennis and Earl C.
Van Horn.
Programming semantics for multiprogrammed computations.
Communications of the ACM, 9:143–155, 1966.
- [Dijkstra, 1968]
- Edsger W.
Dijkstra.
The structure of the ``THE'' multiprogramming system.
Communications of the ACM, 11:341–346, 1968.
- [DoD, 1986]
- US Department of Defence.
Trusted Computer System Evaluation Criteria, 1986.
DoD 5200.28-STD.
- [Draves et al.,
1991]
- Richard P. Draves, Brian N.
Bershad, Richard F. Rashid, and Randall W.
Dean.
Using continuations to implement thread management and communication in
operating systems.
In Proc. 13th Symp. on Operating Systems Principles, 1991.
- [Elkaduwe et al.,
2008]
- Dhammika Elkaduwe, Philip
Derrin, and Kevin Elphinstone.
Kernel design for isolation and assurance of physical memory.
In 1st Workshop on Isolation and Integration in Embedded Systems,
pages 35–40, Glasgow, UK, April 2008. ACM SIGOPS.
- [Elphinstone and Heiser,
2013]
- Kevin Elphinstone and Gernot
Heiser.
From L3 to seL4 – what have we learnt in 20 years of L4 microkernels?
In Symp. on Operating Systems Principles, Farmington, PA, USA,
November 2013.
- [Elphinstone et al.,
2007]
- Kevin Elphinstone, Gerwin
Klein, Philip Derrin, Timothy Roscoe, and
Gernot Heiser.
Towards a practical, verified kernel.
In Proc. 11th Workshop on Hot Topics in Operating Systems, San
Diego, CA, USA, May 2007.
- [Engler et al.,
1995]
- Dawson R. Engler, M. Frans
Kaashoek, and James O'Toole Jr.
Exokernel: An operating system architecture for application-level resource
management.
In 15th Symp. on Operating Systems Principles, Copper Mountain
Resort, CO, 1995. ACM.
(PostScript, 16 pages, 251660 bytes)
- [Fähndrich et al.,
2006]
- Manuel Fähndrich, Mark
Aiken, Chris Hawblitzel, Orion Hodson,
Galen C. Hunt, James R. Larus, and
Steven Levi.
Language support for fast and reliable message-based communication in
Singularity OS.
In Proceedings of Eurosys 2006, pages 177–190, Leuven, Belgium,
April 2006.
(PDF, 358849 bytes)
- [Fitzgerald and Rashid,
1986]
- Robert Fitzgerald and Richard
Rashid.
The integration of virtual memory management and interprocess communication in
Accent.
ACM Transactions on Computer Systems, 4:147–177, 1986.
- [Fleisch et al.,
1998]
- Brett D. Fleisch, Mark
Allan A. Co, and Chao Tan.
Workplace microkernel and OS: A case study.
Software Practice and Experience, 28:569–591, 1998.
- [Fleming and Wallace,
1986]
- Philip J. Fleming and John J.
Wallace.
How not to lie with statistics: The coorect way to summarize benchmark results.
Communications of the ACM, 29(3):218–221, March 1986.
(PDF, 350427 bytes)
- [Ford et al., 1999]
- Bryan
Ford, Mike Hibler, Jay Lepreau,
Roland McGrath, and Patrick Tullmann.
Interface and execution models in the fluke kernel.
In Proceedings of the third symposium on Operating systems design and
implementation, pages 101–115. USENIX Association, 1999.
- [Ge et al., 2019]
- Qian Ge,
Yuval Yarom, Tom Chothia, and
Gernot Heiser.
Time protection: the missing OS abstraction.
In EuroSys Conference, Dresden, Germany, March 2019. ACM.
- [Goel et al., 2005]
- Ashvin
Goel, Kenneth Po, Kamran Farhadi,
Zheng Li, and Eyal de Lara.
The taser intrusion recovery system.
In SOSP '05: Proceedings of the twentieth ACM symposium on Operating
systems principles, 2005.
- [Golub et al.,
1990]
- David B. Golub, Randall W.
Dean, Alessandro Forin, and Richard F. Rashid.
UNIX as an application program.
In Proc. 1990 Summer USENIX Annual Technical Conference, pages
87–95, June 1990.
- [Greenaway, 2007]
- David
Greenaway.
Quantifying the effects of scheduling on IPC performance.
BSc thesis, School of Computer Science and Engineering, University of NSW,
Sydney 2052, Australia, June 2007.
- [Härtig et al.,
1997]
- Hermann Härtig, Michael
Hohmuth, Jochen Liedtke, Sebastian
Schönberg, and Jean Wolter.
The performance of μ-kernel-based systems.
In Proc. Symp. on Operating Systems Principles, pages 66–77, St.
Malo, France, October 1997.
(PDF, 2019149 bytes)
- [Heiser and Elphinstone,
2016]
- Gernot Heiser and Kevin
Elphinstone.
L4 microkernels: The lessons from 20 years of research and deployment.
ACM Transactions on Computer Systems, 34(1):1:1–1:29, April 2016.
(doi:10.1145/2893177)
- [Heiser et al.,
1998]
- Gernot Heiser, Kevin
Elphinstone, Jerry Vochteloo, Stephen Russell,
and Jochen Liedtke.
The Mungi single-address-space operating system.
Software Practice and Experience, 28(9):901–928, July 1998.
- [Heiser, 2020]
- Gernot
Heiser.
The seL4 microkernel
– an introduction.
seL4 Foundation Whitepaper, May 2020.
- [Hill et al., 2000]
- J. Hill,
R. Szewczyk, A. Woo, S. Holland,
D. Culler, and K. Pister.
System architecture directions for network sensors.
In Proc. Int'l Conf. on Architectural Support for Programming Languages
and Operating Systems, Cambridge, MA, November 2000.
(PDF, 268481 bytes)
- [Huberman,
1988]
- Bernardo A. Huberman, editor.
The Ecology of Computation.
Studies in Computer Science and Artifical Intelligence. North-Holland,
Amsterdam, 1988.
- [ISO/IEC 15408, 1999]
- US National Institute
of Standards.
Common Criteria for IT Security Evaluation, 1999.
ISO Standard 15408. http://csrc.nist.gov/cc/.
- [Jaeger, 2008]
- Trent
Jaeger.
Operating System Security.
Synthesis Lectures on Information Security, Privacy and Trust. Morgan &
Claypool, 2008.
(doi:10.2200/S00126ED1V01Y200808SPT001)
- [Kaashoek et al.,
1997]
- M. Frans Kaashoek, Dawson R.
Engler, Gregory R. Ganger, Héctor M.
Briceno, Russell Hunt, David Mazières,
Thomas Pinckney, Robert Grimm,
John Jannotti, and Kenneth Mackenzie.
Application performance and flexibility on exokernel systems.
In 16th Symp. on Operating Systems Principles, Saint Malo, France,
1997. ACM.
(PostScript, 18 pages, 261813 bytes)
- [King and Chen, 2003]
- S. T.
King and P. M. Chen.
Backtracking intrusions.
In Proc. Symp. on Operating Systems Principles, Bolton Landing,
NY, October 2003.
(PDF, 160685 bytes)
- [Klein et al.,
2009]
- Gerwin Klein, Kevin
Elphinstone, Gernot Heiser, June Andronick,
David Cock, Philip Derrin,
Dhammika Elkaduwe, Kai Engelhardt,
Rafal Kolanski, Michael Norrish,
Thomas Sewell, Harvey Tuch, and
Simon Winwood.
seL4:
Formal verification of an OS kernel.
In Proc. 22nd Symp. on Operating Systems Principles, pages
207–220, Big Sky, MT, USA, October 2009. ACM.
- [Klein et al.,
2014]
- Gerwin Klein, June Andronick,
Kevin Elphinstone, Toby Murray,
Thomas Sewell, Rafal Kolanski, and
Gernot Heiser.
Comprehensive formal verification of an OS microkernel.
ACM Transactions on Computer Systems, 32(1):2:1–2:70, February
2014.
(doi:10.1145/2560537)
- [Klein et al.,
2018]
- Gerwin Klein, June Andronick,
Ihor Kuz, Toby Murray, Gernot
Heiser, and Matthew Fernandez.
Formally verified software in the real world.
Communications of the ACM, 2018.
- [Kocher et al.,
2019]
- Paul Kocher, Jann Horn,
Anders Fogh, Daniel Genkin,
Daniel Gruss, Werner Haas, Mike
Haburg, Moritz Lipp, Stefan Mangard,
Thomas Prescher, Michael Schwartz, and
Yuval Yarom.
Spectre attacks: Exploiting speculative execution.
In IEEE Symposium on Security and Privacy, pages 19–37, San
Francisco, May 2019. IEEE.
- [Kontothanassis et al.,
1997]
- Kontothanassis, Wisniewski,
and Scott.
Scheduler-conscious synchronisation.
ACM Transactions on Computer Systems, 15(1), 1997.
- [Lamport et al.,
1982]
- Leslie Lamport, Robert
Shostak, and Marshall Pease.
The byzantine generals problem.
ACM Trans. Program. Lang. Syst., 4(3):382–401, 1982.
(doi:10.1145/357172.357176)
- [Leslie et al.,
2005]
- Ben Leslie, Peter Chubb,
Nicholas Fitzroy-Dale, Stefan Götz,
Charles Gray, Luke Macpherson,
Daniel Potts, Yueting (Rita) Shen,
Kevin Elphinstone, and Gernot Heiser.
User-level device drivers: Achieved performance.
Journal of Computer Science and Technology, 20(5):654–664,
September 2005.
- [LeVasseur et al.,
2004]
- Joshua LeVasseur, Volkmar
Uhlig, Jan Stoess, and Stefan Götz.
Unmodified device driver reuse and improved system dependability via virtual
machines.
In Proc. 6th Symposium on Operating Systems Design and
Implementations, pages 17–30, San Francisco, CA, USA, December
2004.
- [LeVasseur et al.,
2008]
- Joshua LeVasseur, Volkmar
Uhlig, Yaowei Yang, Matthew Chapman,
Peter Chubb, Ben Leslie, and
Gernot Heiser.
Pre-virtualization: soft layering for virtual machines.
In John Morris Yeh-Ching Chung, editor, Proc. 13th IEEE
Asia-Pacific Computer Systems Architecture Conference, Hsinchu,
Taiwan, August 2008. IEEE Computer Society Press.
- [Liedtke, 1993]
- Jochen
Liedtke.
Improving IPC by kernel design.
In Proc. Symp. on Operating Systems Principles, pages 175–188,
Asheville, NC, USA, December 1993.
- [Liedtke, 1995]
- Jochen
Liedtke.
On μ-kernel construction.
In Proc. Symp. on Operating Systems Principles, pages 237–250,
Copper Mountain, CO, USA, December 1995.
- [Lim and Agarwal,
1994]
- Beng-Hong Lim and Anant
Agarwal.
Reactive synchronization algorithms for multiprocessors.
In Proc. 6th Int'l Conf. on Architectural Support for Programming
Languages and Operating Systems, 1994.
- [Lipp et al.,
2018]
- Moritz Lipp, Michael
Schwartz, Daniel Gruss, Thomas Prescher,
Werner Haas, Anders Fogh, Jann
Horn, Stefan Mangard, Paul Kocher,
Daniel Genkin, Yuval Yarom, and
Mike Hamburg.
Meltdown: Reading kernel memory from user space.
In USENIX Security Symposium, Baltimore, MD, USA, August 2018.
Usenix.
- [Liu et al., 2015]
- Fangfei
Liu, Yuval Yarom, Qian Ge,
Gernot Heiser, and Ruby B. Lee.
Last-level cache side-channel attacks are practical.
In IEEE Symposium on Security and Privacy, pages 605–622, San
Jose, CA, US, May 2015.
- [Liu, 2000]
- Jane W. S. Liu.
Real-Time Systems.
Pearson, 2000.
- [Lyons et al., 2018]
- Anna
Lyons, Kent Mcleod, Hesham Almatary, and
Gernot Heiser.
Scheduling-context capabilities: A principled, light-weight OS mechanism
for managing time.
In EuroSys Conference, Porto, PL, April 2018.
- [McKenney et al.,
2002]
- Paul E. McKenney, Dipankar
Sarma, Andrea Arcangelli, Andi Kleen,
Orran Krieger, and Rusty Russell.
Read
copy update.
In Ottawa Linux Symposium, 2002.
- [McKenney, 2004]
- Paul E.
McKenney.
Exploiting
Deferred Destruction: An Analysis of Read-Copy-Update Techniques in Operating
System Kernels.
PhD thesis, OGI School of Science and Engineering at Oregon Health and Sciences
University, 2004.
- [Mellor-Crummey and Scott,
1991]
- John Mellor-Crummey and
Michael Scott.
Algorithms for scalable synchronisation on shared-memory multiprocessors.
ACM Transactions on Computer Systems, 9(1), 1991.
- [Miller et al., 2003]
- Mark
Miller, Ka-Ping Yee, and Jonathan Shapiro.
Capability
myths demolished.
Technical report, HP Labs, 2003.
- [Mullender and Tanenbaum,
1986]
- Sape J. Mullender and
Andrew S. Tanenbaum.
The design of a capability-based distributed operating system.
The Computer Journal, 29:289–299, 1986.
- [Murray et al.,
2013]
- Toby Murray, Daniel Matichuk,
Matthew Brassil, Peter Gammie,
Timothy Bourke, Sean Seefried,
Corey Lewis, Xin Gao, and Gerwin
Klein.
seL4: from general purpose to a proof of information flow enforcement.
In IEEE Symposium on Security and Privacy, pages 415–429, San
Francisco, CA, May 2013.
- [Nourai, 2005]
- Abi Nourai.
A physically-addressed L4 kernel.
BE thesis, School of Computer Science and Engineering, University of NSW,
Sydney 2052, Australia, March 2005.
- [Ousterhout, 1990]
- J.K.
Ousterhout.
Why aren't operating systems getting faster as fast as hardware?
In Proc. 1990 Summer USENIX Annual Technical Conference, pages
247–56, June 1990.
- [Porter et al.,
2011]
- Donald E. Porter, Silas
Boyd-Wickizer, Jon Howell, Reuben Olinsky, and
Galen C. Hunt.
Rethinking the library os from the top down.
In Proceedings of the sixteenth international conference on Architectural
support for programming languages and operating systems, pages
291–304, Newport Beach, California, USA, 2011.
(PDF, 1988991 bytes)
- [Rashid et al.,
1988]
- Richard Rashid, Avadis
Tevanian, Jr., Michael Young, David Golub,
Robert Baron, David Black,
William J. Bolosky, and Jonathan Chew.
Machine-independent virtual memory management for paged uniprocessor and
multiprocessor architectures.
IEEE Transactions on Computers, C-37:896–908, 1988.
- [Rashid, 1988]
- Richard F.
Rashid.
From RIG to Accent to Mach: The evolution of a network operating system.
In Huberman [Huberman,
1988], pages
207–230.
- [Ritchie and Thompson,
1974]
- Dennis M. Ritchie and Ken
Thompson.
The UNIX time-sharing system.
Communications of the ACM, 17(7):365–375, July 1974.
- [Roesner et al.,
2012]
- Franziska Roesner, Tadayoshi
Kohno, Alexander Moshchuk, Bryan Parno,
Helen J. Wang, and Crispin Cowan.
User-driven access control: Rethinking permission granting in modern operating
systems.
In IEEE Symposium on Security and Privacy, pages 224–238, San
Francisco, CA, USA, 2012.
- [Rozier et al.,
1990]
- M. Rozier, V. Abrossimov,
F. Armand, I. Boule, M. Gien,
M. Guillemont, F. Herrmann,
C. Kaiser, S. Langlois,
P. Léonard, and W. Neuhauser.
Overview of the sc chorus distributed operating system.
Technical report CS/TR-90-25, Chorus systeèmes, Montigny-le-Bretonneux
(France), April 1990.
- [Rozier et al.,
1992]
- M. Rozier, V. Abrossimov,
F. Armand, L. Boule, M. Gien,
M. Guillemont, F. Herrman,
C. Kaiser, S. Langlois,
P. Léonard, and W. Neuhauser.
Overview of the Chorus distributed operating system.
In Proc. USENIX WS Microkernels & other Kernel Arch., pages
39–69, Seattle, WA, USA, April 1992.
- [Saltzer and Schroeder,
1975]
- Jerome H. Saltzer and
Michael D. Schroeder.
The protection of information in computer systems.
Proceedings of the IEEE, 63:1278–1308, 1975.
(PDF, 494817 bytes)
- [Schach et al.,
2002]
- Stephen R. Schach, Bo Jin,
David R. Wright, Gillian Z. Heller, and
A. Jefferson Offutt.
Maintainability of the Linux kernel.
IEE Proceedings: Software, 149:18–23, 2002.
(PDF, 718223 bytes)
- [Schimmel, 1994]
- Curt
Schimmel.
UNIX Systems for Modern Architectures.
Addison Wesley, 1994.
- [Seshadri et al.,
2007]
- Arvind Seshadri, Mark Luk,
Ning Qu, and Adrian Perrig.
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for
commodity OSes.
In Symp. on Operating Systems Principles, pages 335–350,
Stevenson, WA, USA, October 2007.
- [Sewell et al.,
2017]
- Thomas Sewell, Felix Kam, and
Gernot Heiser.
High-assurance timing analysis for a high-assurance real-time OS.
Real-Time Systems, 53:812–853, September 2017.
(PDF, 606172 bytes)
(doi:https://doi.org/10.1007/s11241-017-9286-3)
- [Shapiro and Weber,
2000]
- Jonathan S. Shapiro and Samuel
Weber.
Verifying the EROS confinement mechanism.
In IEEE Symposium on Security and Privacy, pages 166–181,
Washington, DC, USA, May 2000.
- [Shapiro, 2003]
- Jonathan S.
Shapiro.
Vulnerabilities in
synchronous IPC designs.
In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May
2003.
- [Shen and Elphinstone,
2015]
- Yanyan Shen and Kevin
Elphinstone.
Microkernel mechanisms for improving the trustworthiness of commodity hardware.
In European Dependable Computing Conference, page 12, Paris,
France, September 2015.
- [Shen et al., 2019]
- YanYan
Shen, Gernot Heiser, and Kevin Elphinstone.
Fault tolerance through redundant execution on COTS multicores: Exploring
trade-offs.
In Dependable Systems and Networks, Portland, Oregon, USA, June
2019. IEEE.
- [Sinha, 1997]
- Pradeep K.
Sinha.
Distributed Operating Systems: Concepts and Design.
Comp. Soc. Press, 1997.
- [Swift et al.,
2003]
- Michael M. Swift, Brian N.
Bershad, and Henry M. Levy.
Improving the reliability of commodity operating systems.
In Proc. 19th Symp. on Operating Systems Principles, Bolton
Landing (Lake George), New York, USA, October 2003.
(PDF, 262776 bytes)
- [Tanenbaum and Mullender,
1981]
- Andrew S. Tanenbaum and
Sape J. Mullender.
An overview of the Amoeba distributed operating system.
Operating Systems Review, 15(3):51–64, 1981.
- [Tanenbaum and Mullender,
1984]
- Andrew S. Tanenbaum and Sape
Mullender.
The design of a capability-based distributed operating system.
Technical Report IR-88, Vrije Universiteit, November 1984.
- [Tullsen et al.,
1995]
- D.M. Tullsen, S.J. Eggers,
and H.M. Levy.
Simultaneous multithreading: Maximizing on-chip parallelism.
In Proc 22nd International Symposium on Computer Architecture,
June 1995.
- [Uhlig et al., 1994]
- Richard
Uhlig, David Nagle, Tim Stanley,
Trevor Mudge, Stuart Sechrest, and
Richard Brown.
Design tradeoffs
for software-managed TLBs.
ACM Transactions on Computer Systems, August 1994.
- [von Behren et al.,
2003]
- R. von Behren, J. Condit, and
E. Brewer.
Why events are a bad idea (for high-concurrency servers).
In Proc. Workshop on Hot Topics in Operating Systems, Hawaii, May
2003.
(PDF, 94267 bytes)
- [Waldspurger,
2002]
- Carl A. Waldspurger.
Memory resource management in VMware ESX server.
In Proc. 5th Symposium on Operating Systems Design and
Implementations, Boston, MA, USA, 2002.
- [Warton, 2005]
- Matthew
Warton.
Single kernel stack L4.
BE thesis, School of Computer Science and Engineering, University of NSW,
Sydney 2052, Australia, November 2005.
- [Watson et al.,
2010]
- Robert N. M. Watson, Jonathan
Anderson, Ben Laurie, and Kris Kennaway.
Capsicum: Practical capabilities for UNIX.
In USENIX Security Symposium, pages 29–46, 2010.
- [Weiser et al.,
1994]
- M. Weiser, B. Welch,
A. J. Demers, and S Shenker.
Scheduling for reduced cpu energy.
In Proc. 1st. Symposium on Operating Systems Design and
Implementations. USENIX Association, 1994.
(PDF, 55846 bytes)
- [Weissel and Bellosa,
2002]
- A. Weissel and F. Bellosa.
Process cruise control: event-driven clock scaling for dynamic power
management.
In Proc. Int'l Conf. on Compilers, Architecture and Synthesis for
Embedded Systems. ACM, 2002.
(PDF, 147502 bytes)
- [Wheeler and Bershad,
1992]
- Bob Wheeler and Brian N.
Bershad.
Consistency management for virtually indexed caches.
In 5th Int'l Conf. on Architectural Support for Programming Languages
and Operating Systems, Boston, MA, October 1992.
(PDF, 1623845 bytes)
- [Wiggins, 2003]
- Adam
Wiggins.
A survey
on the interaction between caching, translation and protection.
Technical Report UNSW-CSE-TR-0321, School of Computer Science and Engineering,
University of NSW, Sydney 2052, Australia, August 2003.
- [Wulf et al.,
1974]
- W. Wulf, E. Cohen,
W. Corwin, A. Jones, R. Levin,
C. Pierson, and F. Pollack.
HYDRA: The kernel of a multiprocessor operating system.
Communications of the ACM, 17:337–345, 1974.
(PDF, 1013725 bytes)
- [Young et al.,
1987]
- Michael Young, Avadis
Tevanian, Richard Rashid, David Golub,
Jeffrey Eppinger, Jonathan Chew,
William Bolosky, David Black, and
Robert Baron.
The duality of memory and communication in the implementation of a
multiprocessor operating system.
In Proc. Symp. on Operating Systems Principles, pages 63–76,
1987.
- [Zeng et al., 2002]
- H. Zeng,
X. Fan, C Ellis, A. Lebeck, and
A. Vahdat.
Ecosystem: Managing energy as a first class operating system resource.
In Proc. 10th. Int'l Conf. on Architectural Support for Programming
Languages and Operating Systems. ACM, 2002.
(PDF, 108612 bytes)
- [Zhang et al.,
2011]
- Fengzhe Zhang, Jin Chen,
Haibo Chen, and Binyu Zang.
CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud
with nested virtualization.
In Symp. on Operating Systems Principles, pages 203–216, Cascais,
Portugal, 2011.