Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alan M. Dunn is active.

Publication


Featured researches published by Alan M. Dunn.


architectural support for programming languages and operating systems | 2013

InkTag: secure applications on an untrusted operating system

Owen S. Hofmann; Sangman Kim; Alan M. Dunn; Michael Z. Lee; Emmett Witchel

InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes.


architectural support for programming languages and operating systems | 2011

Ensuring operating system kernel integrity with OSck

Owen S. Hofmann; Alan M. Dunn; Sangman Kim; Indrajit Roy; Emmett Witchel

Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits by detecting malicious modifications to operating system data. OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead. We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures. High-performance integrity checks that execute concurrently with a running operating system create data races, and we demonstrate a deterministic solution for ensuring kernel memory is in a consistent state. We introduce two new classes of kernel rootkits that are undetectable by current systems, motivating the need for the OSck API that allows kernel developers to conveniently specify arbitrary integrity properties.


european conference on computer systems | 2012

Improving server applications with system transactions

Sangman Kim; Michael Z. Lee; Alan M. Dunn; Owen S. Hofmann; Xuan Wang; Emmett Witchel; Donald E. Porter

Server applications must process requests as quickly as possible. Because some requests depend on earlier requests, there is often a tension between increasing throughput and maintaining the proper semantics for dependent requests. Operating system transactions make it easier to write reliable, high-throughput server applications because they allow the application to execute non-interfering requests in parallel, even if the requests operate on OS state, such as file data. By changing less than 200 lines of application code, we improve performance of a replicated Byzantine Fault Tolerant (BFT) system by up to 88% using server-side speculation, and we improve concurrent performance up to 80% for an IMAP email server by changing only 40 lines. Achieving these results requires substantial enhancements to system transactions, including the ability to pause and resume transactions, and an API to commit transactions in a pre-defined order.


usenix security symposium | 2013

Enabling fine-grained permissions for augmented reality applications with recognizers

Suman Jana; David Molnar; Alexander Moshchuk; Alan M. Dunn; Benjamin Livshits; Helen J. Wang; Eyal Ofek


operating systems design and implementation | 2012

Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels

Alan M. Dunn; Michael Z. Lee; Suman Jana; Sangman Kim; Mark Silberstein; Yuanzhong Xu; Vitaly Shmatikov; Emmett Witchel


hot topics in operating systems | 2013

Operating system support for augmented reality applications

Loris D'Antoni; Alan M. Dunn; Suman Jana; Tadayoshi Kohno; Benjamin Livshits; David Molnar; Alexander Moshchuk; Eyal Ofek; Franziska Roesner; T. Scott Saponas; Margus Veanes; Helen J. Wang


ieee symposium on security and privacy | 2013

Anon-Pass: Practical Anonymous Subscriptions

Michael Z. Lee; Alan M. Dunn; Brent Waters; Emmett Witchel; Jonathan Katz


usenix security symposium | 2011

Cloaking malware with the trusted platform module

Alan M. Dunn; Owen S. Hofmann; Brent Waters; Emmett Witchel


usenix annual technical conference | 2014

Application-defined decentralized access control

Yuanzhong Xu; Alan M. Dunn; Owen S. Hofmann; Michael Z. Lee; Syed Akbar Mehdi; Emmett Witchel


Operating Systems Review | 2016

Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services

Youngjin Kwon; Alan M. Dunn; Michael Z. Lee; Owen S. Hofmann; Yuanzhong Xu; Emmett Witchel

Collaboration


Dive into the Alan M. Dunn's collaboration.

Top Co-Authors

Avatar

Emmett Witchel

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Michael Z. Lee

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Owen S. Hofmann

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Sangman Kim

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Suman Jana

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yuanzhong Xu

University of Texas at Austin

View shared research outputs
Researchain Logo
Decentralizing Knowledge