publications  

conference  

Automated Module-level Application Compartmentalization.  
N. Vasilakis, B. Karel, N Roessler, N. Dautenhahn, A. DeHon, and JMS.  
To appear in Proceedings of the Network and Distributed System Security Symposium, NDSS '18.  
San Diego, CA, USA. February, 2018. The Internet Society.  

Deconstructing Xen.  
L. Shi, Y. Wu, Y. Xia, N. Dautenhahn, H. Chen, B. Zang, H. Guan, and J. Li.  
In Proceedings of the Network and Distributed System Security Symposium, NDSS '17.  
San Diego, CA, USA. February, 2017. The Internet Society. [PDF].  


Slipstream: Automatic Interprocess Communication Optimization.  
W. Dietz, J. Cranmer, N. Dautenhahn, and V. Adve.  
In USENIX Annual Technical Conference. USENIX ATC '15.  
Santa Clara, CA, July, 2015. USENIX Association. [PDF] [Paper @USENIX].  


Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation.  
N. Dautenhahn, T. Kasampalis, W. Dietz, J. Criswell, and V. Adve.  
In Proceedings of the 20th International Conference on Architectural Support   
for Programming Languages and Operating Systems
. ASPLOS'15.  
Istanbul, Turkey, March, 2015. ACM. [PDF][ACM PDF].  


KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels.  
J. Criswell, N. Dautenhahn, and V. Adve.  
In Proceedings of the Thirty-Fifth IEEE Symposium on Securityand Privacy. SP '14.  
San Jose, CA, May 2014. IEEE. [PDF].  


Virtual Ghost: Protecting Applications from Hostile Operating Systems.  
J. Criswell, N. Dautenhahn, and V. Adve.  
In Proceedings of the 19th International Conference on Architectural Support   
for Programming Languages and Operating Systems
. ASPLOS'14.  
Salt Lake City, Utah, March, 2014. ACM. [PDF].  


Quickrec: Prototyping an Intel Architecture Extension for Record and Replay of  
Multithreaded Programs.  
G. Pokam, K. Danne, C. Pereira, R. Kassa, T. Kranich, S. Hu, J. Gottschlich,  
N. Honarmand, N. Dautenhahn, S. T. King, and J. Torrellas.  
In Proceedings of the 40th Annual International Symposium on Computer Architecture. ISCA ’13.  
Tel Aviv, Israel, June, 2013. ACM. [PDF].  


Cyrus: Unintrusive Application-Level Record-Replay for Replay Parallelism.  
N. Honarmand, N. Dautenhahn, J. Torrellas, S. T. King, G. Pokam, and C. Pereira.  
In Proceedings of the 18th International Conference on Architectural Support   
for Programming Languages and Operating Systems
. ASPLOS'13.  
Houston, Texas, ACM, March, 2013. [PDF].  


Using Replicated Execution for a More Secure and Reliable Web Browser.  
H. Xue, N. Dautenhahn, and S. T. King.  
In Proceedings of the Network and Distributed System Security Symposium, NDSS '12.  
San Diego, CA, February, 2012. The Internet Society. [PDF]  


Fortifying Web-Based Applications Automatically.  
S. Tang, N. Dautenhahn, and S. T. King.  
In Proceedings of the 18th ACM Conference on Computer and Communications Security. CCS '11.  
Chicago, Illinois, October, 2011. ACM. [PDF].  


poster  

μBeR: A Microkernel Based Rootkit for Android Smartphones.  
J. M. F. da Trindade, C. Pham, and N. Dautenhahn.  
In 2010 IEEE Symposium on Security and Privacy (SP). IEEE, 2010.  
[Poster PDF] - [Paper PDF].  


thesis & other  

Protection in Commodity Monolithic Operating Systems.  
N. Dautenhahn.  
Doctoral Thesis, University of Illinois at Urbana-Champaign, 2016. [PDF].  


Design and Implementation of a Reputation-Based Trust  
Prototype Using Persistently Identified NeT-working Research Framework.
  
N. Dautenhahn.  
Undergraduate Thesis, University of New Mexico, 2008.  


The SANDstorm Hash.  
M. Torgerson, R. Schroeppel, T. Draelos, N. Dautenhahn, S. Malone, A. Walker,  
M. Collins, and H. Orman. Submission to NIST SHA-3 Cryptography Competition, 2008.