publications  

conference  

Deconstructing Xen.  
L. Shi, Y. Wu, Y. Xia, N. Dautenhahn, H. Chen, B. Zang, H. Guan, and J. Li.  
In Proceedings of the Network and Distributed System Security Symposium, NDSS '17.  
San Diego, CA, USA. February, 2017. The Internet Society. [PDF]   


Slipstream: Automatic Interprocess Communication Optimization  
W. Dietz, J. Cranmer, N. Dautenhahn, and V. Adve.  
In USENIX Annual Technical Conference. USENIX ATC '15,  
Santa Clara, CA, July, 2015. USENIX Association. [PDF] [Paper @USENIX]   


Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation  
N. Dautenhahn, T. Kasampalis, W. Dietz, J. Criswell, and V. Adve.  
In Proceedings of the 20th International Conference on Architectural  
Support for Programming Languages and Operating Systems.
  
New York, NY, USA, 2015. ACM. [PDF][ACM PDF].  


KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels.  
J. Criswell, N. Dautenhahn, and V. Adve.  
In Proceedings of the Thirty-Fifth IEEE Symposium on Security   
and Privacy, SP '14
, San Jose, CA, May 2014. [PDF].  


Virtual Ghost: Protecting Applications from Hostile Operating Systems.  
J. Criswell, N. Dautenhahn, and V. Adve.  
In Proceedings of the 19th International Conference on Architectural  
Support for Programming Languages and Operating Systems.
ACM, 2014. [PDF].  


Quickrec: Prototyping an Intel Architecture Extension for  
Record and Replay of Multithreaded Programs.  
G. Pokam, K. Danne, C. Pereira, R. Kassa, T. Kranich, S. Hu, J. Gottschlich,  
N. Honarmand, N. Dautenhahn, S. T. King, and J. Torrellas.  
In Proceedings of the 40th Annual International Symposium on Computer Architecture,  
ISCA ’13, pages 643–654, New York, NY, USA, 2013. ACM. [PDF]  


Cyrus: Unintrusive Application-Level Record-Replay for Replay Parallelism.  
N. Honarmand, N. Dautenhahn, J. Torrellas, S. T. King, G. Pokam, and C. Pereira.  
In Proceedings of the 18th International Conference on Architectural  
Support for Programming Languages and Operating Systems,
ACM, 2013. [PDF].  


Using Replicated Execution for a More Secure and Reliable Web Browser.  
H. Xue, N. Dautenhahn, and S. T. King.  
In Proceedings of the Network and Distributed System Security Symposium, NDSS '12. San Diego, CA, USA. The Internet Society. [PDF]  


Fortifying Web-Based Applications Automatically.  
S. Tang, N. Dautenhahn, and S. T. King.  
In Proceedings of the 18th ACM Conference on Computer  
and Communications Security
, pages 615-626. ACM, 2011. [PDF]  


poster  

μBeR: A Microkernel Based Rootkit for Android Smartphones.  
J. M. F. da Trindade, C. Pham, and N. Dautenhahn.  
In 2010 IEEE Symposium on Security and Privacy (SP). IEEE, 2010.  
[Poster PDF] - [Paper PDF]  


thesis & other  

Protection in Commodity Monolithic Operating Systems.  
N. Dautenhahn.  
Doctoral Thesis, University of Illinois at Urbana-Champaign, 2016. [PDF]   


Design and Implementation of a Reputation-Based Trust  
Prototype Using Persistently Identified NeT-working Research Framework.
  
N. Dautenhahn.  
Undergraduate Thesis, University of New Mexico, 2008.  


The SANDstorm Hash.  
M. Torgerson, R. Schroeppel, T. Draelos, N. Dautenhahn, S. Malone, A. Walker,  
M. Collins, and H. Orman. Submission to NIST SHA-3 Cryptography Competition, 2008.