[Adams and Agesen, 2006]
Keith Adams and Ole Agesen. A comparison of software and hardware techniques for x86 virtualization. In Proc. 12th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, San Jose, California, USA, October 2006.
[Adya et al., 2002]
Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, and Roger R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proc. 5th Symposium on Operating Systems Design and Implementations, Boston, MA, December 2002. (PDF, 226817 bytes)
[Amani et al., 2016]
Sidney Amani, Alex Hixon, Zilin Chen, Christine Rizkallah, Peter Chubb, Liam O'Connor, Joel Beeren, Yutaka Nagashima, Japheth Lim, Thomas Sewell, Joseph Tuong, Gabriele Keller, Toby Murray, Gerwin Klein, and Gernot Heiser. Cogent: Verifying high-assurance file system implementations. In Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, pages 175–188, Atlanta, GA, USA, April 2016. (doi:10.1145/2872362.2872404)
[Anderson, 1990]
Thomas Anderson. The performance of spin lock alternatives for shared-memory multiprocessors. IEEE Transactions on Parallel and Distributed Systems, 1(1), 1990.
[Arbaugh et al., 1997]
William A. Arbaugh, David J. Farber, and Jonathan M. Smith. A secure and reliable bootstrap architecture. In IEEE Symposium on Security and Privacy, pages 65–71, 1997. (PDF, 689304 bytes)
[Baker et al., 1991]
Mary G. Baker, John H. Hartman, Michael D. Kupfer, Ken W. Shirriff, and John K. Ousterhout. Measurements of a distributed file system. In Proc. 13th Symp. on Operating Systems Principles, Pacific Grove, CA, October 1991. ACM.
[Barham et al., 2003]
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In Proc. 19th Symp. on Operating Systems Principles, pages 164–177, Bolton Landing, NY, USA, October 2003.
[Bell and LaPadula, 1976]
D.E. Bell and L.J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report MTR-2997, MITRE Corp., March 1976.
[Ben-Yehuda et al., 2010]
Muli Ben-Yehuda, Michael D. Day, Zvi Dubitzky, Michael Factor, Nadav Har'El, Abel Gordon, Anthony Liguori, Orit Wasserman, and Ben-Ami Yassour. The turtles project: Design and implementation of nested virtualization. In Proceedings of 9th USENIX Symposium on Opearting Systems Design and Implementation, Vancouver, BC, Canada, 2010. (PDF, 259581 bytes)
[Ben-Yehuday et al., 2010]
Muli Ben-Yehuday, Michael D. Dayz, Zvi Dubitzkyy, Michael Factory, Nadav Har'El, Abel Gordony, Anthony Liguoriz, Orit Wassermany, and Ben-Ami Yassour. The Turtles project: Design and implementation of nested virtualization. In Symposium on Operating Systems Design and Implementations, Vancouver, BC, Canada, October 2010.
[Bershad, 1992]
Brian N. Bershad. The increasing irrelevance of IPC performance for microkernel-based operating systems. In Proc. USENIX WS Microkernels & other Kernel Arch., pages 205–211, Seattle, WA, USA, April 1992.
[Biggs et al., 2018]
Simon Biggs, Damon Lee, and Gernot Heiser. The jury is in: Monolithic OS design is flawed. In Asia-Pacific Workshop on Systems (APSys), Korea, August 2018. ACM SIGOPS. (doi:https://doi.org/10.1145/3265723.3265733)
[Blackham and Heiser, 2012]
Bernard Blackham and Gernot Heiser. Correct, fast, maintainable – choose any three!. In Proc. 3rd Asia-Pacific Workshop on Systems (APSys), Seoul, Korea, July 2012.
[Blackham et al., 2011]
Bernard Blackham, Yao Shi, Sudipta Chattopadhyay, Abhik Roychoudhury, and Gernot Heiser. Timing analysis of a protected operating system kernel. In Proc. Real-Time Systems Symposium, Vienna, Austria, November 2011. (PDF, 253090 bytes)
[Blackham et al., 2012]
Bernard Blackham, Yao Shi, and Gernot Heiser. Improving interrupt response time in a verifiable protected microkernel. In EuroSys Conference, pages 323–336, Bern, Switzerland, April 2012. (doi:10.1145/2168836.2168869)
[Blackham et al., 2012]
Bernard Blackham, Vernon Tang, and Gernot Heiser. To preempt or not to preempt, that is the question. In Proc. 3rd Asia-Pacific Workshop on Systems (APSys), Seoul, Korea, July 2012.
[Bos, 2019]
Herbert Bos. The Cyber Security Body of Knowledge, chapter Operating Systems & Virtualisation. University of Bristol, 2019. Version 1.0.
[Brinch Hansen, 1970]
Per Brinch Hansen. The nucleus of a multiprogramming operating system. Communications of the ACM, 13:238–250, 1970.
[Chen and Bershad, 1993]
J. Bradley Chen and Brian N. Bershad. The impact of operating system structure on memory system performance. In Proc. Symp. on Operating Systems Principles, pages 120–133, Asheville, NC, USA, December 1993. (PDF, 1523803 bytes)
[Chen et al., 2008]
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R.K. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, Seattle, WA, USA, March 2008.
[Clark and Emer, 1985]
Douglas W. Clark and Joel S. Emer. Performance of the VAX-11/780 translation buffer: Simulation and measurement. ACM Transactions on Computer Systems, 3:31–62, 1985.
[Clements et al., 2013]
Austin T. Clements, M. Frans Kaashoek, and Nickolai Zeldovich. RadixVM: Scalable address spaces for multithreaded applications. In EuroSys Conference, Prague, Czech, April 2013.
[Coulouris et al., 1994]
George F. Coulouris, Jean Dollimore, and Tim Kindberg. Distributed Systems: Concepts and Design. Addison-Wesley, 2nd edition, 1994.
[Custer, 1993]
Helen Custer. Inside Windows-NT. Microsoft, 1993.
[Dall and Nieh, 2014]
Christoffer Dall and Jason Nieh. KVM/ARM: The design and implementation of the Linux ARM hypervisor. In Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, pages 333–347, Salt Lake City, UT, USA, March 2014.
[Dean and Armand, 1992]
Randall W. Dean and Francois Armand. Data movement in kernelized systems. In Proc. USENIX WS Microkernels & other Kernel Arch., pages 243–261, Seattle, WA, USA, April 1992.
[Dennis and Van Horn, 1966]
Jack B. Dennis and Earl C. Van Horn. Programming semantics for multiprogrammed computations. Communications of the ACM, 9:143–155, 1966.
[Dijkstra, 1968]
Edsger W. Dijkstra. The structure of the ``THE'' multiprogramming system. Communications of the ACM, 11:341–346, 1968.
[DoD, 1986]
US Department of Defence. Trusted Computer System Evaluation Criteria, 1986. DoD 5200.28-STD.
[Draves et al., 1991]
Richard P. Draves, Brian N. Bershad, Richard F. Rashid, and Randall W. Dean. Using continuations to implement thread management and communication in operating systems. In Proc. 13th Symp. on Operating Systems Principles, 1991.
[Elkaduwe et al., 2008]
Dhammika Elkaduwe, Philip Derrin, and Kevin Elphinstone. Kernel design for isolation and assurance of physical memory. In 1st Workshop on Isolation and Integration in Embedded Systems, pages 35–40, Glasgow, UK, April 2008. ACM SIGOPS.
[Elphinstone and Heiser, 2013]
Kevin Elphinstone and Gernot Heiser. From L3 to seL4 – what have we learnt in 20 years of L4 microkernels? In Symp. on Operating Systems Principles, Farmington, PA, USA, November 2013.
[Elphinstone et al., 2007]
Kevin Elphinstone, Gerwin Klein, Philip Derrin, Timothy Roscoe, and Gernot Heiser. Towards a practical, verified kernel. In Proc. 11th Workshop on Hot Topics in Operating Systems, San Diego, CA, USA, May 2007.
[Engler et al., 1995]
Dawson R. Engler, M. Frans Kaashoek, and James O'Toole Jr. Exokernel: An operating system architecture for application-level resource management. In 15th Symp. on Operating Systems Principles, Copper Mountain Resort, CO, 1995. ACM. (PostScript, 16 pages, 251660 bytes)
[Fähndrich et al., 2006]
Manuel Fähndrich, Mark Aiken, Chris Hawblitzel, Orion Hodson, Galen C. Hunt, James R. Larus, and Steven Levi. Language support for fast and reliable message-based communication in Singularity OS. In Proceedings of Eurosys 2006, pages 177–190, Leuven, Belgium, April 2006. (PDF, 358849 bytes)
[Fitzgerald and Rashid, 1986]
Robert Fitzgerald and Richard Rashid. The integration of virtual memory management and interprocess communication in Accent. ACM Transactions on Computer Systems, 4:147–177, 1986.
[Fleisch et al., 1998]
Brett D. Fleisch, Mark Allan A. Co, and Chao Tan. Workplace microkernel and OS: A case study. Software Practice and Experience, 28:569–591, 1998.
[Fleming and Wallace, 1986]
Philip J. Fleming and John J. Wallace. How not to lie with statistics: The coorect way to summarize benchmark results. Communications of the ACM, 29(3):218–221, March 1986. (PDF, 350427 bytes)
[Ford et al., 1999]
Bryan Ford, Mike Hibler, Jay Lepreau, Roland McGrath, and Patrick Tullmann. Interface and execution models in the fluke kernel. In Proceedings of the third symposium on Operating systems design and implementation, pages 101–115. USENIX Association, 1999.
[Ge et al., 2019]
Qian Ge, Yuval Yarom, Tom Chothia, and Gernot Heiser. Time protection: the missing OS abstraction. In EuroSys Conference, Dresden, Germany, March 2019. ACM.
[Goel et al., 2005]
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, and Eyal de Lara. The taser intrusion recovery system. In SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles, 2005.
[Golub et al., 1990]
David B. Golub, Randall W. Dean, Alessandro Forin, and Richard F. Rashid. UNIX as an application program. In Proc. 1990 Summer USENIX Annual Technical Conference, pages 87–95, June 1990.
[Greenaway, 2007]
David Greenaway. Quantifying the effects of scheduling on IPC performance. BSc thesis, School of Computer Science and Engineering, University of NSW, Sydney 2052, Australia, June 2007.
[Härtig et al., 1997]
Hermann Härtig, Michael Hohmuth, Jochen Liedtke, Sebastian Schönberg, and Jean Wolter. The performance of μ-kernel-based systems. In Proc. Symp. on Operating Systems Principles, pages 66–77, St. Malo, France, October 1997. (PDF, 2019149 bytes)
[Heiser and Elphinstone, 2016]
Gernot Heiser and Kevin Elphinstone. L4 microkernels: The lessons from 20 years of research and deployment. ACM Transactions on Computer Systems, 34(1):1:1–1:29, April 2016. (doi:10.1145/2893177)
[Heiser et al., 1998]
Gernot Heiser, Kevin Elphinstone, Jerry Vochteloo, Stephen Russell, and Jochen Liedtke. The Mungi single-address-space operating system. Software Practice and Experience, 28(9):901–928, July 1998.
[Heiser, 2020]
Gernot Heiser. The seL4 microkernel – an introduction. seL4 Foundation Whitepaper, May 2020.
[Hill et al., 2000]
J. Hill, R. Szewczyk, A. Woo, S. Holland, D. Culler, and K. Pister. System architecture directions for network sensors. In Proc. Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, November 2000. (PDF, 268481 bytes)
[Huberman, 1988]
Bernardo A. Huberman, editor. The Ecology of Computation. Studies in Computer Science and Artifical Intelligence. North-Holland, Amsterdam, 1988.
[ISO/IEC 15408, 1999]
US National Institute of Standards. Common Criteria for IT Security Evaluation, 1999. ISO Standard 15408. http://csrc.nist.gov/cc/.
[Jaeger, 2008]
Trent Jaeger. Operating System Security. Synthesis Lectures on Information Security, Privacy and Trust. Morgan & Claypool, 2008. (doi:10.2200/S00126ED1V01Y200808SPT001)
[Kaashoek et al., 1997]
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceno, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, and Kenneth Mackenzie. Application performance and flexibility on exokernel systems. In 16th Symp. on Operating Systems Principles, Saint Malo, France, 1997. ACM. (PostScript, 18 pages, 261813 bytes)
[King and Chen, 2003]
S. T. King and P. M. Chen. Backtracking intrusions. In Proc. Symp. on Operating Systems Principles, Bolton Landing, NY, October 2003. (PDF, 160685 bytes)
[Klein et al., 2009]
Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, and Simon Winwood. seL4: Formal verification of an OS kernel. In Proc. 22nd Symp. on Operating Systems Principles, pages 207–220, Big Sky, MT, USA, October 2009. ACM.
[Klein et al., 2014]
Gerwin Klein, June Andronick, Kevin Elphinstone, Toby Murray, Thomas Sewell, Rafal Kolanski, and Gernot Heiser. Comprehensive formal verification of an OS microkernel. ACM Transactions on Computer Systems, 32(1):2:1–2:70, February 2014. (doi:10.1145/2560537)
[Klein et al., 2018]
Gerwin Klein, June Andronick, Ihor Kuz, Toby Murray, Gernot Heiser, and Matthew Fernandez. Formally verified software in the real world. Communications of the ACM, 2018.
[Kocher et al., 2019]
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Haburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwartz, and Yuval Yarom. Spectre attacks: Exploiting speculative execution. In IEEE Symposium on Security and Privacy, pages 19–37, San Francisco, May 2019. IEEE.
[Kontothanassis et al., 1997]
Kontothanassis, Wisniewski, and Scott. Scheduler-conscious synchronisation. ACM Transactions on Computer Systems, 15(1), 1997.
[Lamport et al., 1982]
Leslie Lamport, Robert Shostak, and Marshall Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, 1982. (doi:10.1145/357172.357176)
[Leslie et al., 2005]
Ben Leslie, Peter Chubb, Nicholas Fitzroy-Dale, Stefan Götz, Charles Gray, Luke Macpherson, Daniel Potts, Yueting (Rita) Shen, Kevin Elphinstone, and Gernot Heiser. User-level device drivers: Achieved performance. Journal of Computer Science and Technology, 20(5):654–664, September 2005.
[LeVasseur et al., 2004]
Joshua LeVasseur, Volkmar Uhlig, Jan Stoess, and Stefan Götz. Unmodified device driver reuse and improved system dependability via virtual machines. In Proc. 6th Symposium on Operating Systems Design and Implementations, pages 17–30, San Francisco, CA, USA, December 2004.
[LeVasseur et al., 2008]
Joshua LeVasseur, Volkmar Uhlig, Yaowei Yang, Matthew Chapman, Peter Chubb, Ben Leslie, and Gernot Heiser. Pre-virtualization: soft layering for virtual machines. In John Morris Yeh-Ching Chung, editor, Proc. 13th IEEE Asia-Pacific Computer Systems Architecture Conference, Hsinchu, Taiwan, August 2008. IEEE Computer Society Press.
[Liedtke, 1993]
Jochen Liedtke. Improving IPC by kernel design. In Proc. Symp. on Operating Systems Principles, pages 175–188, Asheville, NC, USA, December 1993.
[Liedtke, 1995]
Jochen Liedtke. On μ-kernel construction. In Proc. Symp. on Operating Systems Principles, pages 237–250, Copper Mountain, CO, USA, December 1995.
[Lim and Agarwal, 1994]
Beng-Hong Lim and Anant Agarwal. Reactive synchronization algorithms for multiprocessors. In Proc. 6th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, 1994.
[Lipp et al., 2018]
Moritz Lipp, Michael Schwartz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. Meltdown: Reading kernel memory from user space. In USENIX Security Symposium, Baltimore, MD, USA, August 2018. Usenix.
[Liu et al., 2015]
Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. Last-level cache side-channel attacks are practical. In IEEE Symposium on Security and Privacy, pages 605–622, San Jose, CA, US, May 2015.
[Liu, 2000]
Jane W. S. Liu. Real-Time Systems. Pearson, 2000.
[Lyons et al., 2018]
Anna Lyons, Kent Mcleod, Hesham Almatary, and Gernot Heiser. Scheduling-context capabilities: A principled, light-weight OS mechanism for managing time. In EuroSys Conference, Porto, PL, April 2018.
[McKenney et al., 2002]
Paul E. McKenney, Dipankar Sarma, Andrea Arcangelli, Andi Kleen, Orran Krieger, and Rusty Russell. Read copy update. In Ottawa Linux Symposium, 2002.
[McKenney, 2004]
Paul E. McKenney. Exploiting Deferred Destruction: An Analysis of Read-Copy-Update Techniques in Operating System Kernels. PhD thesis, OGI School of Science and Engineering at Oregon Health and Sciences University, 2004.
[Mellor-Crummey and Scott, 1991]
John Mellor-Crummey and Michael Scott. Algorithms for scalable synchronisation on shared-memory multiprocessors. ACM Transactions on Computer Systems, 9(1), 1991.
[Miller et al., 2003]
Mark Miller, Ka-Ping Yee, and Jonathan Shapiro. Capability myths demolished. Technical report, HP Labs, 2003.
[Mullender and Tanenbaum, 1986]
Sape J. Mullender and Andrew S. Tanenbaum. The design of a capability-based distributed operating system. The Computer Journal, 29:289–299, 1986.
[Murray et al., 2013]
Toby Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, and Gerwin Klein. seL4: from general purpose to a proof of information flow enforcement. In IEEE Symposium on Security and Privacy, pages 415–429, San Francisco, CA, May 2013.
[Nourai, 2005]
Abi Nourai. A physically-addressed L4 kernel. BE thesis, School of Computer Science and Engineering, University of NSW, Sydney 2052, Australia, March 2005.
[Ousterhout, 1990]
J.K. Ousterhout. Why aren't operating systems getting faster as fast as hardware? In Proc. 1990 Summer USENIX Annual Technical Conference, pages 247–56, June 1990.
[Porter et al., 2011]
Donald E. Porter, Silas Boyd-Wickizer, Jon Howell, Reuben Olinsky, and Galen C. Hunt. Rethinking the library os from the top down. In Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, pages 291–304, Newport Beach, California, USA, 2011. (PDF, 1988991 bytes)
[Rashid et al., 1988]
Richard Rashid, Avadis Tevanian, Jr., Michael Young, David Golub, Robert Baron, David Black, William J. Bolosky, and Jonathan Chew. Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures. IEEE Transactions on Computers, C-37:896–908, 1988.
[Rashid, 1988]
Richard F. Rashid. From RIG to Accent to Mach: The evolution of a network operating system. In Huberman [Huberman, 1988], pages 207–230.
[Ritchie and Thompson, 1974]
Dennis M. Ritchie and Ken Thompson. The UNIX time-sharing system. Communications of the ACM, 17(7):365–375, July 1974.
[Roesner et al., 2012]
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, and Crispin Cowan. User-driven access control: Rethinking permission granting in modern operating systems. In IEEE Symposium on Security and Privacy, pages 224–238, San Francisco, CA, USA, 2012.
[Rozier et al., 1990]
M. Rozier, V. Abrossimov, F. Armand, I. Boule, M. Gien, M. Guillemont, F. Herrmann, C. Kaiser, S. Langlois, P. Léonard, and W. Neuhauser. Overview of the sc chorus distributed operating system. Technical report CS/TR-90-25, Chorus systeèmes, Montigny-le-Bretonneux (France), April 1990.
[Rozier et al., 1992]
M. Rozier, V. Abrossimov, F. Armand, L. Boule, M. Gien, M. Guillemont, F. Herrman, C. Kaiser, S. Langlois, P. Léonard, and W. Neuhauser. Overview of the Chorus distributed operating system. In Proc. USENIX WS Microkernels & other Kernel Arch., pages 39–69, Seattle, WA, USA, April 1992.
[Saltzer and Schroeder, 1975]
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63:1278–1308, 1975. (PDF, 494817 bytes)
[Schach et al., 2002]
Stephen R. Schach, Bo Jin, David R. Wright, Gillian Z. Heller, and A. Jefferson Offutt. Maintainability of the Linux kernel. IEE Proceedings: Software, 149:18–23, 2002. (PDF, 718223 bytes)
[Schimmel, 1994]
Curt Schimmel. UNIX Systems for Modern Architectures. Addison Wesley, 1994.
[Seshadri et al., 2007]
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Symp. on Operating Systems Principles, pages 335–350, Stevenson, WA, USA, October 2007.
[Sewell et al., 2017]
Thomas Sewell, Felix Kam, and Gernot Heiser. High-assurance timing analysis for a high-assurance real-time OS. Real-Time Systems, 53:812–853, September 2017. (PDF, 606172 bytes) (doi:https://doi.org/10.1007/s11241-017-9286-3)
[Shapiro and Weber, 2000]
Jonathan S. Shapiro and Samuel Weber. Verifying the EROS confinement mechanism. In IEEE Symposium on Security and Privacy, pages 166–181, Washington, DC, USA, May 2000.
[Shapiro, 2003]
Jonathan S. Shapiro. Vulnerabilities in synchronous IPC designs. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003.
[Shen and Elphinstone, 2015]
Yanyan Shen and Kevin Elphinstone. Microkernel mechanisms for improving the trustworthiness of commodity hardware. In European Dependable Computing Conference, page 12, Paris, France, September 2015.
[Shen et al., 2019]
YanYan Shen, Gernot Heiser, and Kevin Elphinstone. Fault tolerance through redundant execution on COTS multicores: Exploring trade-offs. In Dependable Systems and Networks, Portland, Oregon, USA, June 2019. IEEE.
[Sinha, 1997]
Pradeep K. Sinha. Distributed Operating Systems: Concepts and Design. Comp. Soc. Press, 1997.
[Swift et al., 2003]
Michael M. Swift, Brian N. Bershad, and Henry M. Levy. Improving the reliability of commodity operating systems. In Proc. 19th Symp. on Operating Systems Principles, Bolton Landing (Lake George), New York, USA, October 2003. (PDF, 262776 bytes)
[Tanenbaum and Mullender, 1981]
Andrew S. Tanenbaum and Sape J. Mullender. An overview of the Amoeba distributed operating system. Operating Systems Review, 15(3):51–64, 1981.
[Tanenbaum and Mullender, 1984]
Andrew S. Tanenbaum and Sape Mullender. The design of a capability-based distributed operating system. Technical Report IR-88, Vrije Universiteit, November 1984.
[Tullsen et al., 1995]
D.M. Tullsen, S.J. Eggers, and H.M. Levy. Simultaneous multithreading: Maximizing on-chip parallelism. In Proc 22nd International Symposium on Computer Architecture, June 1995.
[Uhlig et al., 1994]
Richard Uhlig, David Nagle, Tim Stanley, Trevor Mudge, Stuart Sechrest, and Richard Brown. Design tradeoffs for software-managed TLBs. ACM Transactions on Computer Systems, August 1994.
[von Behren et al., 2003]
R. von Behren, J. Condit, and E. Brewer. Why events are a bad idea (for high-concurrency servers). In Proc. Workshop on Hot Topics in Operating Systems, Hawaii, May 2003. (PDF, 94267 bytes)
[Waldspurger, 2002]
Carl A. Waldspurger. Memory resource management in VMware ESX server. In Proc. 5th Symposium on Operating Systems Design and Implementations, Boston, MA, USA, 2002.
[Warton, 2005]
Matthew Warton. Single kernel stack L4. BE thesis, School of Computer Science and Engineering, University of NSW, Sydney 2052, Australia, November 2005.
[Watson et al., 2010]
Robert N. M. Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. Capsicum: Practical capabilities for UNIX. In USENIX Security Symposium, pages 29–46, 2010.
[Weiser et al., 1994]
M. Weiser, B. Welch, A. J. Demers, and S Shenker. Scheduling for reduced cpu energy. In Proc. 1st. Symposium on Operating Systems Design and Implementations. USENIX Association, 1994. (PDF, 55846 bytes)
[Weissel and Bellosa, 2002]
A. Weissel and F. Bellosa. Process cruise control: event-driven clock scaling for dynamic power management. In Proc. Int'l Conf. on Compilers, Architecture and Synthesis for Embedded Systems. ACM, 2002. (PDF, 147502 bytes)
[Wheeler and Bershad, 1992]
Bob Wheeler and Brian N. Bershad. Consistency management for virtually indexed caches. In 5th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems, Boston, MA, October 1992. (PDF, 1623845 bytes)
[Wiggins, 2003]
Adam Wiggins. A survey on the interaction between caching, translation and protection. Technical Report UNSW-CSE-TR-0321, School of Computer Science and Engineering, University of NSW, Sydney 2052, Australia, August 2003.
[Wulf et al., 1974]
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. Communications of the ACM, 17:337–345, 1974. (PDF, 1013725 bytes)
[Young et al., 1987]
Michael Young, Avadis Tevanian, Richard Rashid, David Golub, Jeffrey Eppinger, Jonathan Chew, William Bolosky, David Black, and Robert Baron. The duality of memory and communication in the implementation of a multiprocessor operating system. In Proc. Symp. on Operating Systems Principles, pages 63–76, 1987.
[Zeng et al., 2002]
H. Zeng, X. Fan, C Ellis, A. Lebeck, and A. Vahdat. Ecosystem: Managing energy as a first class operating system resource. In Proc. 10th. Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. ACM, 2002. (PDF, 108612 bytes)
[Zhang et al., 2011]
Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Symp. on Operating Systems Principles, pages 203–216, Cascais, Portugal, 2011.