Michael Dalton

According to our database1, Michael Dalton authored at least 14 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019

2018
Andromeda: Performance, Isolation, and Velocity at Scale in Cloud Network Virtualization.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

2013
Experience with model-based performance, reliability, and adaptability assessment of a complex industrial architecture.
Softw. Syst. Model., 2013

2011
Detecting software modularity violations.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
The design and implementation of dynamic information flow tracking systems for software security.
PhD thesis, 2010

Tainting is not pointless.
ACM SIGOPS Oper. Syst. Rev., 2010

2009
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications.
Proceedings of the 18th USENIX Security Symposium, 2009

Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Real-World Buffer Overflow Protection for Userspace and Kernelspace.
Proceedings of the 17th USENIX Security Symposium, 2008

Hardware Enforcement of Application Security Policies Using Tagged Memory.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Exploring educational standard alignment: in search of 'relevance'.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2008

Thread-safe dynamic binary translation using transactional memory.
Proceedings of the 14th International Conference on High-Performance Computer Architecture (HPCA-14 2008), 2008

2007
Raksha: a flexible information flow architecture for software security.
Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), 2007

2005
Improving software security with a C pointer analysis.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005


  Loading...