• Hong J, Shim S, Park S, Kim T, Kim J, Lee J, Ryu S and Kang J. (2024). Taming shared mutable states of operating systems in Rust. Science of Computer Programming. 238:C. Online publication date: 1-Dec-2024.

    https://doi.org/10.1016/j.scico.2024.103152

  • Chiang Y, Chang W, Li S and Tu J. Securing a Multiprocessor KVM Hypervisor with Rust. Proceedings of the 2024 ACM Symposium on Cloud Computing. (650-667).

    https://doi.org/10.1145/3698038.3698562

  • Huang G, Schuermann L and Levy A. Bridge: A Leak-Free Hardware-Software Architecture for Parallel Embedded Systems. Proceedings of the 2nd Workshop on Kernel Isolation, Safety and Verification. (16-22).

    https://doi.org/10.1145/3698576.3698765

  • Dwivedi K, Iyer R and Kashyap S. Fast, Flexible, and Practical Kernel Extensions. Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles. (249-264).

    https://doi.org/10.1145/3694715.3695950

  • Wagner A, Oberhansl F and Schink M. (2024). Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures. Journal of Cryptographic Engineering. 10.1007/s13389-024-00362-4. 14:4. (631-648). Online publication date: 1-Nov-2024.

    https://link.springer.com/10.1007/s13389-024-00362-4

  • Yang W, Gao C, Liu X, Li Y and Xue Y. Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation. Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering. (631-642).

    https://doi.org/10.1145/3691620.3695059

  • Vandervelden T, De Smet R, Deac D, Steenhaut K and Braeken A. (2024). Overview of Embedded Rust Operating Systems and Frameworks. Sensors. 10.3390/s24175818. 24:17. (5818).

    https://www.mdpi.com/1424-8220/24/17/5818

  • Bakir F, Wang S, Ekaireb T, Pearson J, Krintz C and Wolski R. (2024). Ambience: an operating system for IoT microservices. Journal of Edge Computing. 10.55056/jec.786.

    https://acnsci.org/journal/index.php/jec/article/view/786

  • Peng Y, Tian H, Xian J, Zhou S, Yan S and Zhang Y. Framekernel: A Safe and Efficient Kernel Architecture via Rust-based Intra-kernel Privilege Separation. Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems. (31-37).

    https://doi.org/10.1145/3678015.3680492

  • Cui M, Xu H, Tian H and Zhou Y. (2024). <sc>rCanary</sc>: Detecting Memory Leaks Across Semi-Automated Memory Management Boundary in Rust. IEEE Transactions on Software Engineering. 50:9. (2472-2484). Online publication date: 1-Sep-2024.

    https://doi.org/10.1109/TSE.2024.3443624

  • Hu K, Huang W, Wang L, Mo C, Wang R, Chen Y, Ren J and Jiang B. (2024). Unishyper. Journal of Systems Architecture: the EUROMICRO Journal. 153:C. Online publication date: 1-Aug-2024.

    https://doi.org/10.1016/j.sysarc.2024.103199

  • Kang J, Park J, Seo J and Kwon D. Look Before You Access: Efficient Heap Memory Safety for Embedded Systems on ARMv8-M. Proceedings of the 61st ACM/IEEE Design Automation Conference. (1-6).

    https://doi.org/10.1145/3649329.3655949

  • Hong J and Ryu S. (2024). Don’t Write, but Return: Replacing Output Parameters with Algebraic Data Types in C-to-Rust Translation. Proceedings of the ACM on Programming Languages. 8:PLDI. (716-740). Online publication date: 20-Jun-2024.

    https://doi.org/10.1145/3656406

  • Sharma S, Sharma A and Machiry A. Aunor: Converting Rust crates to [no_std] at scale. Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy. (163-165).

    https://doi.org/10.1145/3626232.3658640

  • Laufer E, Levis P and Rajagopal R. Privacy-Preserving Control of Partitioned Energy Resources. Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems. (610-624).

    https://doi.org/10.1145/3632775.3661988

  • Qin B, Chen Y, Liu H, Zhang H, Wen Q, Song L and Zhang Y. (2024). Understanding and Detecting Real-World Safety Issues in Rust. IEEE Transactions on Software Engineering. 50:6. (1306-1324). Online publication date: 1-Jun-2024.

    https://doi.org/10.1109/TSE.2024.3380393

  • Cui M, Sun S, Xu H and Zhou Y. Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming. Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. (1-13).

    https://doi.org/10.1145/3597503.3639136

  • Yang W, Song L and Xue Y. Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation. Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. (1-13).

    https://doi.org/10.1145/3597503.3639103

  • Watson J, Agrawal S, Tsang R, Luo S, Popa R and Dutta P. (2024). Retcon: Live Updates for Embedded Event-Driven Applications 2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). 10.1109/IPSN61024.2024.00015. 979-8-3503-6201-5. (126-137).

    https://ieeexplore.ieee.org/document/10577355/

  • Yedidia Z. Lightweight Fault Isolation: Practical, Efficient, and Secure Software Sandboxing. Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2. (649-665).

    https://doi.org/10.1145/3620665.3640408

  • Dai Z, Liu S, Sjoberg V, Li X, Chen Y, Wang W, Jia Y, Anderson S, Elbeheiry L, Sondhi S, Zhang Y, Ni Z, Yan S, Gu R and He Z. Verifying Rust Implementation of Page Tables in a Software Enclave Hypervisor. Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2. (1218-1232).

    https://doi.org/10.1145/3620665.3640398

  • Miller S, Kumar A, Vakharia T, Chen A, Zhuo D and Anderson T. Enoki: High Velocity Linux Kernel Scheduler Development. Proceedings of the Nineteenth European Conference on Computer Systems. (962-980).

    https://doi.org/10.1145/3627703.3629569

  • Tan X, Mohan S, Armanuzzaman M, Ma Z, Liu G, Eastman A, Hu H and Zhao Z. Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems. Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. (1350-1357).

    https://doi.org/10.1145/3605098.3635925

  • LI L, ZHANG Q, XU Z, ZHAO S, SHI Z and GUAN Y. (2024). rOOM: A Rust-Based Linux Out of Memory Kernel Component. IEICE Transactions on Information and Systems. 10.1587/transinf.2023MPP0001. E107.D:3. (245-256). Online publication date: 1-Mar-2024.

    https://www.jstage.jst.go.jp/article/transinf/E107.D/3/E107.D_2023MPP0001/_article

  • Eichler C, Röckl J, Jung B, Schlenk R, Müller T and Hönig T. (2024). Profiling with trust: system monitoring from trusted execution environments. Design Automation for Embedded Systems. 28:1. (23-44). Online publication date: 1-Mar-2024.

    https://doi.org/10.1007/s10617-024-09283-1

  • Tan X and Zhao Z. SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (1332-1346).

    https://doi.org/10.1145/3576915.3623077

  • Filipiuk T, Wanninger N, Dhiantravan N, Surmeier C, Bernat A and Dinda P. CARAT KOP: Towards Protecting the Core HPC Kernel from Linux Kernel Modules. Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, Network, Storage, and Analysis. (1596-1605).

    https://doi.org/10.1145/3624062.3624237

  • Amar S, Chisnall D, Chen T, Filardo N, Laurie B, Liu K, Norton R, Moore S, Tao Y, Watson R and Xia H. CHERIoT: Complete Memory Safety for Embedded Devices. Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture. (641-653).

    https://doi.org/10.1145/3613424.3614266

  • Schuermann L, Thomas A and Levy A. Encapsulated Functions: Fortifying Rust's FFI in Embedded Systems. Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification. (41-48).

    https://doi.org/10.1145/3625275.3625397

  • Ma Z, Chen G and Zhong L. Panic Recovery in Rust-based Embedded Systems. Proceedings of the 12th Workshop on Programming Languages and Operating Systems. (66-73).

    https://doi.org/10.1145/3623759.3624549

  • Gonzalez A, Mvondo D and Bromberg Y. Takeaways of Implementing a Native Rust UDP Tunneling Network Driver in the Linux Kernel. Proceedings of the 12th Workshop on Programming Languages and Operating Systems. (18-25).

    https://doi.org/10.1145/3623759.3624547

  • Wang W, Sobral V, Billah M, Saoda N, Nasir N and Campbell B. (2023). Low Power but High Energy: The Looming Costs of Billions of Smart Devices. ACM SIGEnergy Energy Informatics Review. 3:3. (10-14). Online publication date: 1-Oct-2023.

    https://doi.org/10.1145/3630614.3630617

  • Bradley C and Barrera D. Escaping Vendor Mortality: A New Paradigm for Extending IoT Device Longevity. Proceedings of the 2023 New Security Paradigms Workshop. (1-16).

    https://doi.org/10.1145/3633500.3633501

  • Gigerl B, Primas R and Mangard S. Secure Context Switching of Masked Software Implementations. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. (980-992).

    https://doi.org/10.1145/3579856.3595798

  • Burtsev A, Narayanan V, Huang Y, Huang K, Tan G and Jaeger T. Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces. Proceedings of the 19th Workshop on Hot Topics in Operating Systems. (166-173).

    https://doi.org/10.1145/3593856.3595914

  • Surminski S, Niesler C, Davi L and Sadeghi A. DMA’n’Play: Practical Remote Attestation Based on Direct Memory Access. Applied Cryptography and Network Security. (32-61).

    https://doi.org/10.1007/978-3-031-33491-7_2

  • Yao Z, Seyed Talebi S, Chen M, Amiri Sani A and Anderson T. Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware. Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services. (233-246).

    https://doi.org/10.1145/3581791.3596864

  • Li X, Li F and Gao M. (2023). Flare: A Fast, Secure, and Memory-Efficient Distributed Analytics Framework. Proceedings of the VLDB Endowment. 16:6. (1439-1452). Online publication date: 1-Feb-2023.

    https://doi.org/10.14778/3583140.3583158

  • Ghinea D, Kaczmarczyck F, Pullman J, Cretin J, Kölbl S, Misoczki R, Picod J, Invernizzi L and Bursztein E. (2023). Hybrid Post-quantum Signatures in Hardware Security Keys. Applied Cryptography and Network Security Workshops. 10.1007/978-3-031-41181-6_26. (480-499).

    https://link.springer.com/10.1007/978-3-031-41181-6_26

  • Dejon N, Gaber C and Grimaud G. (2022). From MMU to MPU: Adaptation of the Pip Kernel to Constrained Devices 12th International Conference on Artificial Intelligence, Soft Computing and Applications. 10.5121/csit.2022.122309. 9781925953831. (109-127). Online publication date: 22-Dec-2022.

    https://aircconline.com/csit/papers/vol12/csit122309.pdf

  • Rottleuthner M, Schmidt T and Wahlisch M. Dynamic Clock Reconfiguration for the Constrained IoT and its Application to Energy-efficient Networking. Proceedings of the 2022 INTERNATIONAL CONFERENCE ON EMBEDDED WIRELESS SYSTEMS AND NETWORKS. (168-179).

    /doi/10.5555/3578948.3578964

  • Barbareschi M, Barone S, Casola V, Montone P and Moriconi A. (2022). A Memory Protection Strategy for Resource Constrained Devices in Safety Critical Applications 2022 6th International Conference on System Reliability and Safety (ICSRS). 10.1109/ICSRS56243.2022.10067350. 978-1-6654-7092-6. (533-538).

    https://ieeexplore.ieee.org/document/10067350/

  • Jung B, Eichler C, Rockl J, Schlenk R, Honig T and Muller T. (2022). Trusted Monitor: TEE-Based System Monitoring 2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC). 10.1109/SBESC56799.2022.9964869. 978-1-6654-7425-2. (1-8).

    https://ieeexplore.ieee.org/document/9964869/

  • Wagner A, Oberhansl F and Schink M. To Be, or Not to Be Stateful. Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security. (85-94).

    https://doi.org/10.1145/3560834.3563831

  • Culic I, Vochescu A and Radovici A. (2022). A Low-Latency Optimization of a Rust-Based Secure Operating System for Embedded Devices. Sensors. 10.3390/s22228700. 22:22. (8700).

    https://www.mdpi.com/1424-8220/22/22/8700

  • Zandberg K, Baccelli E, Yuan S, Besson F and Talpin J. Femto-containers. Proceedings of the 23rd ACM/IFIP International Middleware Conference. (161-173).

    https://doi.org/10.1145/3528535.3565242

  • Wang B and Seltzer M. Tinkertoy: Build Your Own Operating Systems for IoT Devices. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 10.1109/TCAD.2022.3198907. 41:11. (4028-4039).

    https://ieeexplore.ieee.org/document/9857589/

  • Ayers H, Laufer E, Mure P, Park J, Rodelo E, Rossman T, Pronin A, Levis P and Van Why J. Tighten rust’s belt: shrinking embedded Rust binaries. Proceedings of the 23rd ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. (121-132).

    https://doi.org/10.1145/3519941.3535075

  • Bradbury M, Jhumka A, Watson T, Flores D, Burton J and Butler M. (2022). Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. ACM Transactions on Sensor Networks. 18:2. (1-41). Online publication date: 31-May-2022.

    https://doi.org/10.1145/3510424

  • Payet É, Pearce D and Spoto F. On the Termination of Borrow Checking in Featherweight Rust. NASA Formal Methods. (411-430).

    https://doi.org/10.1007/978-3-031-06773-0_22

  • Zhu S, Zhang Z, Qin B, Xiong A and Song L. Learning and programming challenges of rust. Proceedings of the 44th International Conference on Software Engineering. (1269-1281).

    https://doi.org/10.1145/3510003.3510164

  • Tempel S, Herdt V and Drechsler R. (2022). SymEx-VP. Journal of Systems Architecture: the EUROMICRO Journal. 126:C. Online publication date: 1-May-2022.

    https://doi.org/10.1016/j.sysarc.2022.102456

  • Ayers H, Dutta P, Levis P, Levy A, Pannuto P, Van Why J and Watson J. Tiered trust for useful embedded systems security. Proceedings of the 15th European Workshop on Systems Security. (15-21).

    https://doi.org/10.1145/3517208.3523752

  • Suchy B, Ghosh S, Kersnar D, Chai S, Huang Z, Nelson A, Cuevas M, Bernat A, Chaudhary G, Hardavellas N, Campanoni S and Dinda P. CARAT CAKE: replacing paging via compiler/kernel cooperation. Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. (98-114).

    https://doi.org/10.1145/3503222.3507771

  • Su Y, Chesser M, Gao Y, Sample A and Ranasinghe D. Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2022.3175313. (1-1).

    https://ieeexplore.ieee.org/document/9775575/

  • Zhang R, Liu D, Chen X, She X, Yang C, Tan Y, Shen Z, Shao Z and Qiao L. ELOFS: An Extensible Low-overhead Flash File System for Resource-scarce Embedded Devices. IEEE Transactions on Computers. 10.1109/TC.2022.3152079. (1-1).

    https://ieeexplore.ieee.org/document/9715229/

  • Oliveira D, Gomes T and Pinto S. uTango: An Open-Source TEE for IoT Devices. IEEE Access. 10.1109/ACCESS.2022.3152781. 10. (23913-23930).

    https://ieeexplore.ieee.org/document/9717221/

  • Li Z, Wang J, Sun M and Lui J. MirChecker: Detecting Bugs in Rust Programs via Static Analysis. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. (2183-2196).

    https://doi.org/10.1145/3460120.3484541

  • Jiang J, Xu H and Zhou Y. (2021). RULF: Rust Library Fuzzing via API Dependency Graph Traversal 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE). 10.1109/ASE51524.2021.9678813. 978-1-6654-0337-5. (581-592).

    https://ieeexplore.ieee.org/document/9678813/

  • Burtsev A, Appel D, Detweiler D, Huang T, Li Z, Narayanan V and Zellweger G. Isolation in Rust. Proceedings of the 11th Workshop on Programming Languages and Operating Systems. (76-83).

    https://doi.org/10.1145/3477113.3487272

  • Broadnax B, Koch A, Mechler J, Müller T, Müller-Quade J and Nagel M. (2021). Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules. Proceedings on Privacy Enhancing Technologies. 10.2478/popets-2021-0072. 2021:4. (312-338). Online publication date: 1-Oct-2021.. Online publication date: 1-Oct-2021.

    https://petsymposium.org/popets/2021/popets-2021-0072.php

  • Zhang R, Liu D, Shen Z, She X, Yang C, Chen X, Tan Y and Wang C. Bridging Mismatched Granularity Between Embedded File Systems and Flash Memory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 10.1109/TCAD.2020.3036814. 40:10. (2024-2035).

    https://ieeexplore.ieee.org/document/9253705/

  • Li J, Miller S, Zhuo D, Chen A, Howell J and Anderson T. An incremental path towards a safer OS kernel. Proceedings of the Workshop on Hot Topics in Operating Systems. (183-190).

    https://doi.org/10.1145/3458336.3465277

  • Kim S, Kim H and Kim C. A3. Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021). (299-314).

    https://doi.org/10.1145/3412382.3458273

  • Pearce D. (2021). A Lightweight Formalism for Reference Lifetimes and Borrowing in Rust. ACM Transactions on Programming Languages and Systems. 43:1. (1-73). Online publication date: 31-Mar-2021.

    https://doi.org/10.1145/3443420

  • van Oorschot P. Toward Unseating the Unsafe C Programming Language. IEEE Security & Privacy. 10.1109/MSEC.2020.3048766. 19:2. (4-6).

    https://ieeexplore.ieee.org/document/9382362/

  • Chiang H, Ayers H, Giffin D, Levy A and Levis P. Power Clocks: Dynamic Multi-Clock Management for Embedded Systems. Proceedings of the 2021 International Conference on Embedded Wireless Systems and Networks. (139-150).

    /doi/10.5555/3451271.3451284

  • Choudhuri S. (2021). A Case for Unikernels in IoT: Enhancing Security and Performance. Internet of Things: Enabling Technologies, Security and Social Implications. 10.1007/978-981-15-8621-7_7. (85-91).

    http://link.springer.com/10.1007/978-981-15-8621-7_7

  • Jung K, Gascon‐Samson J, Goyal S, Rezaiean‐Asel A and Pattabiraman K. (2020). ThingsMigrate: Platform‐independent migration of stateful JavaScript Internet of Things applications. Software: Practice and Experience. 10.1002/spe.2936. 51:1. (117-155). Online publication date: 1-Jan-2021.

    https://onlinelibrary.wiley.com/doi/10.1002/spe.2936

  • Vochescu A, Culic I and Radovici A. (2020). Multi-Layer Security Framework for IoT Devices 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet). 10.1109/RoEduNet51892.2020.9324871. 978-0-7381-1265-7. (1-5).

    https://ieeexplore.ieee.org/document/9324871/

  • Wan S, Sun M, Sun K, Zhang N and He X. RusTEE: Developing Memory-Safe ARM TrustZone Applications. Proceedings of the 36th Annual Computer Security Applications Conference. (442-453).

    https://doi.org/10.1145/3427228.3427262

  • Venkat S, Clyburn M and Campbell B. Energy Harvesting Systems Need an Operating System Too. Proceedings of the 8th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems. (15-21).

    https://doi.org/10.1145/3417308.3430274

  • Nelson L, Van Geffen J, Torlak E and Wang X. Specification and verification in the field. Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation. (41-61).

    /doi/10.5555/3488766.3488769

  • Narayanan V, Huang T, Detweiler D, Appel D, Li Z, Zellweger G and Burtsev A. RedLeaf. Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation. (21-39).

    /doi/10.5555/3488766.3488768

  • Boos K, Liyanage N, Ijaz R and Zhong L. Theseus. Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation. (1-19).

    /doi/10.5555/3488766.3488767

  • Duan J, Yang Y, Zhou J and Criswell J. (2020). Refactoring the FreeBSD Kernel with Checked C 2020 IEEE Secure Development (SecDev). 10.1109/SecDev45635.2020.00018. 978-1-7281-8388-6. (15-22).

    https://ieeexplore.ieee.org/document/9229980/

  • Zhang R, Liu D, Chen X, She X, Yang C, Tan Y, Shen Z and Shao Z. LOFFS. Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference. (1-6).

    /doi/10.5555/3437539.3437640

  • Evans A, Campbell B and Soffa M. Is rust used safely by software developers?. Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. (246-257).

    https://doi.org/10.1145/3377811.3380413

  • Qin B, Chen Y, Yu Z, Song L and Zhang Y. Understanding memory and thread safety practices and issues in real-world Rust programs. Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. (763-779).

    https://doi.org/10.1145/3385412.3386036

  • Maeng K and Lucia B. Adaptive low-overhead scheduling for periodic and reactive intermittent execution. Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. (1005-1021).

    https://doi.org/10.1145/3385412.3385998

  • Karageorgos I, Sriram K, Veselý J, Wu M, Powell M, Borton D, Manohar R and Bhattacharjee A. Hardware-software co-design for brain-computer interfaces. Proceedings of the ACM/IEEE 47th Annual International Symposium on Computer Architecture. (391-404).

    https://doi.org/10.1109/ISCA45697.2020.00041

  • Ayers H, Crews P, Teo H, McAvity C, Levy A and Levis P. (2020). Design Considerations for Low Power Internet Protocols 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS). 10.1109/DCOSS49796.2020.00027. 978-1-7281-4351-4. (103-111).

    https://ieeexplore.ieee.org/document/9183440/

  • Sung M, Olivier P, Lankes S and Ravindran B. Intra-unikernel isolation with Intel memory protection keys. Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. (143-156).

    https://doi.org/10.1145/3381052.3381326

  • Sensaoui A, Aktouf O, Hely D and Di Vito S. (2019). An In-depth Study of MPU-Based Isolation Techniques. Journal of Hardware and Systems Security. 10.1007/s41635-019-00078-6.

    http://link.springer.com/10.1007/s41635-019-00078-6

  • Lee K, Kang J, Yoon W, Kim J and Moon S. Enveloping Implicit Assumptions of Intrusive Data Structures within Ownership Type System. Proceedings of the 10th Workshop on Programming Languages and Operating Systems. (16-22).

    https://doi.org/10.1145/3365137.3365403

  • Athalye A, Belay A, Kaashoek M, Morris R and Zeldovich N. Notary. Proceedings of the 27th ACM Symposium on Operating Systems Principles. (97-113).

    https://doi.org/10.1145/3341301.3359661

  • Pinho A, Couto L and Oliveira J. (2019). Towards Rust for Critical Systems 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 10.1109/ISSREW.2019.00036. 978-1-7281-5138-0. (19-24).

    https://ieeexplore.ieee.org/document/8990314/

  • Sensaoui A, Hely D and Aktouf O. (2019). Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices 2019 15th European Dependable Computing Conference (EDCC). 10.1109/EDCC.2019.00018. 978-1-7281-3929-6. (31-38).

    https://ieeexplore.ieee.org/document/8893367/

  • Li Z, Wang J, Sun M and Lui J. Securing the Device Drivers of Your Embedded Systems. Proceedings of the 14th International Conference on Availability, Reliability and Security. (1-10).

    https://doi.org/10.1145/3339252.3340506

  • Maeng K and Lucia B. Supporting peripherals in intermittent systems with just-in-time checkpoints. Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. (1101-1116).

    https://doi.org/10.1145/3314221.3314613

  • Miller S, Zhang K, Zhuo D, Xu S, Krishnamurthy A and Anderson T. Practical Safe Linux Kernel Extensibility. Proceedings of the Workshop on Hot Topics in Operating Systems. (170-176).

    https://doi.org/10.1145/3317550.3321429

  • Jackson N, Adkins J and Dutta P. A long-lifetime sensor platform for a reliable internet of things. Proceedings of the 18th International Conference on Information Processing in Sensor Networks. (331-332).

    https://doi.org/10.1145/3302506.3312491

  • Pinto S, Araujo H, Oliveira D, Martins J and Tavares A. (2019). Virtualization on TrustZone-Enabled Microcontrollers? Voilà! 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). 10.1109/RTAS.2019.00032. 978-1-7281-0678-6. (293-304).

    https://ieeexplore.ieee.org/document/8743255/

  • Adkins J, Ghena B and Dutta P. (2019). Signpost. GetMobile: Mobile Computing and Communications. 22:3. (23-26). Online publication date: 17-Jan-2019.

    https://doi.org/10.1145/3308755.3308763

  • Zandberg K, Schleiser K, Acosta F, Tschofenig H and Baccelli E. Secure Firmware Updates for Constrained IoT Devices Using Open Standards: A Reality Check. IEEE Access. 10.1109/ACCESS.2019.2919760. 7. (71907-71920).

    https://ieeexplore.ieee.org/document/8725488/

  • Chiang H, Giffin D, Levy A and Levis P. Dynamic Multi-Clock Management for Embedded Systems. Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems. (347-348).

    https://doi.org/10.1145/3274783.3275176

  • Kim H, Andersen M, Chen K, Kumar S, Zhao W, Ma K and Culler D. System Architecture Directions for Post-SoC/32-bit Networked Sensors. Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems. (264-277).

    https://doi.org/10.1145/3274783.3274839

  • Kobayashi T, Sasaki T, Jada A, Asoni D and Perrig A. SAFES. Proceedings of the 3rd Workshop on System Software for Trusted Execution. (37-41).

    https://doi.org/10.1145/3268935.3268939

  • Kulkarni C, Moore S, Naqvi M, Zhang T, Ricci R and Stutsman R. Splinter. Proceedings of the 13th USENIX conference on Operating Systems Design and Implementation. (627-643).

    /doi/10.5555/3291168.3291215

  • Maeng K and Lucia B. Adaptive dynamic checkpointing for safe efficient intermittent computing. Proceedings of the 13th USENIX conference on Operating Systems Design and Implementation. (129-144).

    /doi/10.5555/3291168.3291178

  • Cutler C, Kaashoek M and Morris R. The benefits and costs of writing a POSIX kernel in a high-level language. Proceedings of the 13th USENIX conference on Operating Systems Design and Implementation. (89-105).

    /doi/10.5555/3291168.3291176

  • Adkins J, Ghena B, Jackson N, Pannuto P, Rohrer S, Campbell B and Dutta P. The signpost platform for city-scale sensing. Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks. (188-199).

    https://doi.org/10.1109/IPSN.2018.00047

  • Adkins J, Campbell B, Ghena B, Jackson N, Pannuto P and Dutta P. Energy Isolation Required for Multi-tenant Energy Harvesting Platforms. Proceedings of the Fifth ACM International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems. (27-30).

    https://doi.org/10.1145/3142992.3142995