Operating systems: design and implementation
Operating systems: design and implementation
The NeWS book: an introduction to the network/extensible window system
The NeWS book: an introduction to the network/extensible window system
Computers and Security
The structure and performance of interpreters
Proceedings of the seventh international conference on Architectural support for programming languages and operating systems
Communications of the ACM
Advanced compiler design and implementation
Advanced compiler design and implementation
Dynamo: a transparent dynamic optimization system
PLDI '00 Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation
A note on the confinement problem
Communications of the ACM
Bytecode compression via profiled grammar rewriting
Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementation
ACM Transactions on Computer Systems (TOCS)
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Secure Execution via Program Shepherding
Proceedings of the 11th USENIX Security Symposium
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
ICSE '81 Proceedings of the 5th international conference on Software engineering
A brief history of just-in-time
ACM Computing Surveys (CSUR)
The exokernel operating system architecture
The exokernel operating system architecture
Survey of code-size reduction methods
ACM Computing Surveys (CSUR)
Countering code-injection attacks with instruction-set randomization
Proceedings of the 10th ACM conference on Computer and communications security
Randomized instruction set emulation to disrupt binary code injection attacks
Proceedings of the 10th ACM conference on Computer and communications security
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
Randomized instruction set emulation
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
OS-Aware Branch Prediction: Improving Microprocessor Control Flow Prediction for Operating Systems
IEEE Transactions on Computers
Broad new OS research: challenges and opportunities
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Intrusion detection using sequences of system calls
Journal of Computer Security
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
The N-Version Approach to Fault-Tolerant Software
IEEE Transactions on Software Engineering
Rethinking antivirus: executable analysis in the network cloud
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Introduction and overview of the multics system
AFIPS '65 (Fall, part I) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
Some thoughts about the social implications of accessible computing
AFIPS '65 (Fall, part I) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Spyware and Adware
A Framework for Behavior-Based Malware Analysis in the Cloud
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Server-side detection of malware infection
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Communications of the ACM
seL4: formal verification of an operating-system kernel
Communications of the ACM
Ready to buy or just browsing?: detecting web searcher goals from interaction data
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
On the General Applicability of Instruction-Set Randomization
IEEE Transactions on Dependable and Secure Computing
How unique is your web browser?
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Paranoid Android: versatile protection for smartphones
Proceedings of the 26th Annual Computer Security Applications Conference
Computer Viruses and Malware
CloneCloud: elastic execution between mobile device and cloud
Proceedings of the sixth conference on Computer systems
Runtime Defense against Code Injection Attacks Using Replicated Execution
IEEE Transactions on Dependable and Secure Computing
Proceedings of the 2011 workshop on New security paradigms workshop
Walled gardens: the new shape of the public internet
Proceedings of the 2012 iConference
World Wide Web caching: the application-level view of the Internet
IEEE Communications Magazine
Hi-index | 0.00 |
Why should a user's computer be trusted at all? We propose a new model of the computer, Babel, that makes a user's computer appear as it normally would, but is actually untrusted to the point where it cannot run the code installed on it. Each computer, each process, speaks a different language, and a translator on the network, in the cloud, is needed to allow a user's computer to execute code. This has enormous implications. The user gets continuous protection, and multiple kinds of protection, with no need for security updates or patches. At the same time, the user effectively has an adjustable control that they can set based on their risk assessment and need for privacy. Babel can work perfectly well alongside existing systems, and opens new markets for security.