Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Amit Vasudevan
@inproceedings{DBLP:conf/csfw/DerakhshanZVJ23, author = {Farzaneh Derakhshan and Zichao Zhang and Amit Vasudevan and Limin Jia}, title = {Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {324--339}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00021}, doi = {10.1109/CSF57540.2023.00021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DerakhshanZVJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/5gwf/GallagherWHV22, author = {Shannon K. Gallagher and Austin Whisnant and Anton D. Hristozov and Amit Vasudevan}, title = {Reviewing the role of machine learning and artificial intelligence for remote attestation in 5G+ networks}, booktitle = {2022 {IEEE} Future Networks World Forum, {FNWF} 2022, Montreal, QC, Canada, October 10-14, 2022}, pages = {602--607}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FNWF55208.2022.00111}, doi = {10.1109/FNWF55208.2022.00111}, timestamp = {Fri, 10 Mar 2023 11:36:39 +0100}, biburl = {https://dblp.org/rec/conf/5gwf/GallagherWHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtcsa/McCormackVLS21, author = {Matt McCormack and Amit Vasudevan and Guyue Liu and Vyas Sekar}, title = {Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway\({}^{\mbox{{\textdaggerdbl}}}\)}, booktitle = {27th {IEEE} International Conference on Embedded and Real-Time Computing Systems and Applications, {RTCSA} 2021, Houston, TX, USA, August 18-20, 2021}, pages = {93--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/RTCSA52859.2021.00019}, doi = {10.1109/RTCSA52859.2021.00019}, timestamp = {Tue, 05 Oct 2021 08:44:45 +0200}, biburl = {https://dblp.org/rec/conf/rtcsa/McCormackVLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtns/MartinsMNVAKLK21, author = {Ruben Martins and Michael McCall and Dionisio de Niz and Amit Vasudevan and Bj{\"{o}}rn Andersson and Mark Klein and John P. Lehoczky and Hyoseung Kim}, editor = {Audrey Queudet and Iain Bate and Giuseppe Lipari}, title = {Formal Verification of a Mixed-Trust Synchronization Protocol}, booktitle = {RTNS'2021: 29th International Conference on Real-Time Networks and Systems, Nantes, France, April 7-9, 2021}, pages = {57--67}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3453417.3453431}, doi = {10.1145/3453417.3453431}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rtns/MartinsMNVAKLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/EcheverriaLMOWN21, author = {Sebasti{\'{a}}n Echeverr{\'{\i}}a and Grace A. Lewis and Craig Mazzotta and Kyle O'Meara and Keegan Williams and Marc Novakouski and Amit Vasudevan and Matthew McCormack and Vyas Sekar}, title = {KalKi++: {A} Scalable and Extensible IoT Security Platform}, booktitle = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans, LA, USA, June 14 - July 31, 2021}, pages = {368--373}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WF-IoT51360.2021.9595004}, doi = {10.1109/WF-IOT51360.2021.9595004}, timestamp = {Tue, 16 Nov 2021 08:53:09 +0100}, biburl = {https://dblp.org/rec/conf/wf-iot/EcheverriaLMOWN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/VasudevanMM20, author = {Amit Vasudevan and Petros Maniatis and Ruben Martins}, title = {{\"{u}}berSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {54}, number = {1}, pages = {8--22}, year = {2020}, url = {https://doi.org/10.1145/3421473.3421476}, doi = {10.1145/3421473.3421476}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/VasudevanMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotedge/McCormackVLEOLS20, author = {Matt McCormack and Amit Vasudevan and Guyue Liu and Sebasti{\'{a}}n Echeverr{\'{\i}}a and Kyle O'Meara and Grace A. Lewis and Vyas Sekar}, editor = {Irfan Ahmad and Ming Zhao}, title = {Towards an Architecture for Trusted Edge IoT Security Gateways}, booktitle = {3rd {USENIX} Workshop on Hot Topics in Edge Computing, HotEdge 2020, June 25-26, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/hotedge20/presentation/mccormack}, timestamp = {Fri, 04 Jun 2021 11:57:43 +0200}, biburl = {https://dblp.org/rec/conf/hotedge/McCormackVLEOLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/EcheverriaLMGOV20, author = {Sebasti{\'{a}}n Echeverr{\'{\i}}a and Grace A. Lewis and Craig Mazzotta and Christopher Grabowski and Kyle O'Meara and Amit Vasudevan and Marc Novakouski and Matthew McCormack and Vyas Sekar}, title = {KalKi: {A} Software-Defined IoT Security Platform}, booktitle = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans, LA, USA, June 2-16, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WF-IoT48130.2020.9221050}, doi = {10.1109/WF-IOT48130.2020.9221050}, timestamp = {Mon, 19 Oct 2020 12:52:29 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/EcheverriaLMGOV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/Vasudevan19, author = {Amit Vasudevan}, title = {Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25049-2}, doi = {10.1007/978-3-030-25049-2}, isbn = {978-3-030-25048-5}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/Vasudevan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtcsa/NizAKLVKM19, author = {Dionisio de Niz and Bj{\"{o}}rn Andersson and Mark H. Klein and John P. Lehoczky and Amit Vasudevan and Hyoseung Kim and Gabriel A. Moreno}, title = {Mixed-Trust Computing for Real-Time Systems}, booktitle = {25th {IEEE} International Conference on Embedded and Real-Time Computing Systems and Applications, {RTCSA} 2019, Hangzhou, China, August 18-21, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/RTCSA.2019.8864566}, doi = {10.1109/RTCSA.2019.8864566}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rtcsa/NizAKLVKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/VasudevanC18, author = {Amit Vasudevan and Sagar Chaki}, title = {Have Your {PI} and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {183--198}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00021}, doi = {10.1109/EUROSP.2018.00021}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/VasudevanC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VasudevanCMJD16, author = {Amit Vasudevan and Sagar Chaki and Petros Maniatis and Limin Jia and Anupam Datta}, editor = {Thorsten Holz and Stefan Savage}, title = {{\"{u}}berSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {87--104}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vasudevan}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/VasudevanCMJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/VasudevanMN14, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome}, title = {Trustworthy Execution on Mobile Devices}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-8190-4}, doi = {10.1007/978-1-4614-8190-4}, isbn = {978-1-4614-8189-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/VasudevanMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OwusuGMNPV13, author = {Emmanuel Owusu and Jorge Guajardo and Jonathan M. McCune and James Newsome and Adrian Perrig and Amit Vasudevan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{OASIS:} on achieving a sanctuary for integrity and secrecy on untrusted platforms}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516678}, doi = {10.1145/2508859.2516678}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OwusuGMNPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VasudevanCJMND13, author = {Amit Vasudevan and Sagar Chaki and Limin Jia and Jonathan M. McCune and James Newsome and Anupam Datta}, title = {Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {430--444}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.36}, doi = {10.1109/SP.2013.36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vee/ChenMPVS13, author = {Chen Chen and Petros Maniatis and Adrian Perrig and Amit Vasudevan and Vyas Sekar}, editor = {Steve Muir and Gernot Heiser and Stephen M. Blackburn}, title = {Towards verifiable resource accounting for outsourced computation}, booktitle = {{ACM} {SIGPLAN/SIGOPS} International Conference on Virtual Execution Environments (co-located with {ASPLOS} 2013), {VEE} '13, Houston, TX, USA, March 16-17, 2013}, pages = {167--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2451512.2451546}, doi = {10.1145/2451512.2451546}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/vee/ChenMPVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12, author = {Carsten Willems and Ralf Hund and Andreas Fobian and Dennis Felsch and Thorsten Holz and Amit Vasudevan}, editor = {Robert H'obbes' Zakon}, title = {Down to the bare metal: using processor features for binary analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {189--198}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420980}, doi = {10.1145/2420950.2420980}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasudevanMNPD12, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome and Adrian Perrig and Leendert van Doorn}, editor = {Heung Youl Youm and Yoojae Won}, title = {{CARMA:} a hardware tamper-resistant isolated execution environment on commodity x86 platforms}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {48--49}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414484}, doi = {10.1145/2414456.2414484}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VasudevanMNPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/FranklinCDMV12, author = {Jason Franklin and Sagar Chaki and Anupam Datta and Jonathan M. McCune and Amit Vasudevan}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Parametric Verification of Address Space Separation}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {51--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_4}, doi = {10.1007/978-3-642-28641-4\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/FranklinCDMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanPQGP12, author = {Amit Vasudevan and Bryan Parno and Ning Qu and Virgil D. Gligor and Adrian Perrig}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {34--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_3}, doi = {10.1007/978-3-642-30921-2\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanPQGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanOZNM12, author = {Amit Vasudevan and Emmanuel Owusu and Zongwei Zhou and James Newsome and Jonathan M. McCune}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {159--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_10}, doi = {10.1007/978-3-642-30921-2\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VasudevanQP11, author = {Amit Vasudevan and Ning Qu and Adrian Perrig}, title = {XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms}, booktitle = {44th Hawaii International International Conference on Systems Science {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HICSS.2011.500}, doi = {10.1109/HICSS.2011.500}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VasudevanQP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanMQDP10, author = {Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {141--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_10}, doi = {10.1007/978-3-642-13869-0\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanMQDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Vasudevan09, author = {Amit Vasudevan}, editor = {Anas Abou El Kalam and Yves Deswarte and Mahmoud Mostafa}, title = {Re-inforced stealth breakpoints}, booktitle = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009}, pages = {59--66}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CRISIS.2009.5411978}, doi = {10.1109/CRISIS.2009.5411978}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/crisis/Vasudevan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Vasudevan08, author = {Amit Vasudevan}, title = {MalTRAK: Tracking and Eliminating Unknown Malware}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {311--321}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.44}, doi = {10.1109/ACSAC.2008.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Vasudevan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/VasudevanY06, author = {Amit Vasudevan and Ramesh Yerraballi}, editor = {Vladimir Estivill{-}Castro and Gillian Dobbie}, title = {SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation}, booktitle = {Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006}, series = {{CRPIT}}, volume = {48}, pages = {311--320}, publisher = {Australian Computer Society}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1151734}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsc/VasudevanY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VasudevanY06, author = {Amit Vasudevan and Ramesh Yerraballi}, title = {Cobra: Fine-grained Malware Analysis using Stealth Localized-executions}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {264--279}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.9}, doi = {10.1109/SP.2006.9}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/VasudevanY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VasudevanY05, author = {Amit Vasudevan and Ramesh Yerraballi}, title = {Stealth Breakpoints}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {381--392}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.52}, doi = {10.1109/CSAC.2005.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VasudevanY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/VasudevanYC05, author = {Amit Vasudevan and Ramesh Yerraballi and Ashish Chawla}, editor = {Vladimir Estivill{-}Castro}, title = {A High Performance Kernel-Less Operating System Architecture}, booktitle = {Computer Science 2005, Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, NSW, Australia, January/February 2005}, series = {{CRPIT}}, volume = {38}, pages = {287--296}, publisher = {Australian Computer Society}, year = {2005}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV38Vasudevan.html}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsc/VasudevanYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.