Team for Research in
Ubiquitous Secure Technology

Device driver safety through a reference validation mechanism

Citation
"Device driver safety through a reference validation mechanism". Fred Schneider, Dan Williams, Patrick Reynolds, Kevin Walsh & Emin Gun Sirer (eds.), Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation OSDI '08, December, 2008.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
     <a
    href="http://www.truststc.org/pubs/563.html"
    ><i>Device driver safety through a reference
    validation mechanism</i></a>, Fred Schneider,
    Dan Williams, Patrick Reynolds, Kevin Walsh & Emin Gun
    Sirer (eds.), Proceedings of the 8th USENIX Symposium on
    Operating Systems Design and Implementation OSDI '08,
    December, 2008.
  • Plain text
     "Device driver safety through a reference validation
    mechanism". Fred Schneider, Dan Williams, Patrick
    Reynolds, Kevin Walsh & Emin Gun Sirer (eds.),
    Proceedings of the 8th USENIX Symposium on Operating Systems
    Design and Implementation OSDI '08, December, 2008.
  • BibTeX
    @proceedings{SchneiderWilliamsReynoldsSirer08_DeviceDriverSafetyThroughReferenceValidationMechanism,
        title = {Device driver safety through a reference
                  validation mechanism},
        editor = {Fred Schneider, Dan Williams, Patrick Reynolds,
                  Kevin Walsh \& Emin Gun Sirer},
        organization = {Proceedings of the 8th USENIX Symposium on
                  Operating Systems Design and Implementation OSDI
                  '08},
        month = {December},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/563.html}
    }
    

Posted by Jessica Gamble on 20 Feb 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.