Gernot Heiser
#20,005
Most Influential Person Now
Australian computer scientist
Gernot Heiser's AcademicInfluence.com Rankings
Gernot Heisercomputer-science Degrees
Computer Science
#1031
World Rank
#1069
Historical Rank
Database
#2952
World Rank
#3079
Historical Rank
Download Badge
Computer Science
Why Is Gernot Heiser Influential?
(Suggest an Edit or Addition)According to Wikipedia, Gernot Heiser is a Scientia Professor and the John Lions Chair for operating systems at UNSW Sydney, where he leads the Trustworthy Systems group . Life In 1991, Heiser joined the School of Computer Science and Engineering of UNSW Sydney, originally as a lecturer, reaching the rank of full professor in 2002, a position he retains to date.
Gernot Heiser's Published Works
Published Works
- seL4: formal verification of an OS kernel (2009) (1676)
- An Analysis of Power Consumption in a Smartphone (2010) (1607)
- Last-Level Cache Side-Channel Attacks are Practical (2015) (865)
- Dynamic voltage and frequency scaling: the laws of diminishing returns (2010) (424)
- A survey of microarchitectural timing attacks and countermeasures on contemporary hardware (2018) (343)
- CATalyst: Defeating last-level cache side channel attacks in cloud computing (2016) (325)
- Comprehensive formal verification of an OS microkernel (2014) (320)
- seL4: formal verification of an operating-system kernel (2010) (310)
- The role of virtualization in embedded systems (2008) (267)
- Koala: a platform for OS-level power management (2009) (220)
- The OKL4 microvisor: convergence point of microkernels and hypervisors (2010) (177)
- From L3 to seL4 what have we learnt in 20 years of L4 microkernels? (2013) (148)
- Power Management and Dynamic Voltage Scaling: Myths and Facts (2005) (141)
- Providing Dynamic Update in an Operating System (2005) (141)
- User-Level Device Drivers: Achieved Performance (2005) (139)
- Automatic device driver synthesis with termite (2009) (112)
- Dingo: taming device drivers (2009) (107)
- Towards trustworthy computing systems: taking microkernels to the next level (2007) (105)
- Hardware-supported virtualization on ARM (2011) (95)
- The systems hacker's guide to the galaxy energy usage in a modern smartphone (2013) (91)
- Accurate on-line prediction of processor and memoryenergy usage under voltage scaling (2007) (89)
- Cogent: Verifying High-Assurance File System Implementations (2016) (88)
- Mapping the Intel Last-Level Cache (2015) (86)
- Slow Down or Sleep, That Is the Question (2011) (86)
- The Last Mile: An Empirical Study of Timing Channels on seL4 (2014) (84)
- The Mungi Single-Address-Space Operating System (1994) (83)
- The mungi single‐address‐space operating system (1998) (83)
- CAmkES: A component model for secure microkernel-based embedded systems (2007) (75)
- Timing Analysis of a Protected Operating System Kernel (2011) (72)
- Achieved IPC performance (still the foundation for extensibility) (1997) (69)
- Towards a Practical, Verified Kernel (2007) (67)
- Pre-virtualization: Slashing the cost of virtualization (2005) (61)
- Hypervisors for Consumer Electronics (2009) (61)
- L4 Microkernels: The Lessons from 20 Years of Research and Deployment (2016) (60)
- Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly (2007) (59)
- Time Protection: The Missing OS Abstraction (2018) (59)
- OS Verification - Now! (2005) (56)
- A scalable lock manager for multicores (2013) (55)
- Three-dimensional numerical semiconductor device simulation: algorithms, architectures, results (1991) (55)
- Resource management in the Mungi single-address-space operating system (1998) (54)
- Wombat: A portable user-mode Linux for embedded systems (2005) (52)
- Mungi: A distributed single-address-space operating system (1994) (51)
- Virtualizing embedded systems - why bother? (2011) (51)
- vNUMA: A Virtual Shared-Memory Multiprocessor (2009) (50)
- Mobile multicores: use them or waste them (2013) (46)
- Unifying DVFS and offlining in mobile multicores (2014) (45)
- Implementing Transparent Shared Memory on Clusters Using Virtual Machines (2005) (44)
- Pre-virtualization: Soft layering for virtual machines (2008) (42)
- Achieved IPC Performance (1997) (41)
- Formally verified software in the real world (2018) (40)
- Hype and Virtue (2007) (37)
- Proceedings of the sixth conference on Computer systems (2011) (36)
- Operating systems technology for converged ECUs (2008) (35)
- Itanium: a system implementor's tale (2005) (35)
- Improving interrupt response time in a verifiable protected microkernel (2012) (30)
- Accurate Run-Time Prediction of Performance Degradation under Frequency Scaling (2007) (30)
- Secure Embedded Systems Need Microkernels (2005) (30)
- Virtualization for Embedded Systems (2007) (30)
- Are virtual-machine monitors microkernels done right? (2006) (28)
- Performance of address-space multiplexing on the Pentium (2002) (27)
- Capability-based protection in the Mungi operating system (1993) (27)
- No Security Without Time Protection: We Need a New Hardware-Software Contract (2018) (27)
- Trickle: Automated infeasible path detection using all minimal unsatisfiable subsets (2014) (26)
- Operating systems on SoCs: A good idea? (2004) (26)
- Power measurement as the basis for power management (2005) (26)
- Implementation of Fast Address-Space Switching and TLB Sharing on the StrongARM Processor (2003) (25)
- File systems deserve verification too! (2013) (24)
- A Formal Approach to Constructing Secure Air Vehicle Software (2018) (23)
- Legba: Fast Hardware Support for Fine-Grained Protection (2003) (23)
- Static analysis support for measurement-based WCET analysis (2006) (23)
- Benchmarking Crimes: An Emerging Threat in Systems Security (2018) (22)
- The Motorola Evoke QA4: A case study in mobile virtualization (2009) (22)
- Towards Untrusted Device Drivers (2003) (21)
- Scheduling-context capabilities: a principled, light-weight operating-system mechanism for managing time (2018) (21)
- Linking Programs in a Single Address Space (1999) (20)
- Complete, High-Assurance Determination of Loop Bounds and Infeasible Paths for WCET Analysis (2016) (20)
- Fast address-space switching on the StrongARM SA-1100 processor (2000) (20)
- Measurements or Static Analysis or Both? (2007) (19)
- Implementation and Performance of the Mungi Single-Address-Space Operating System (1997) (18)
- RapiLog: reducing system complexity through verification (2013) (18)
- Prevention of Microarchitectural Covert Channels on an Open-Source 64-bit RISC-V Core (2020) (18)
- The case for active device drivers (2010) (18)
- The Jury Is In: Monolithic OS Design Is Flawed: Microkernel-based Designs Improve Security (2018) (17)
- Sequoll: A framework for model checking binaries (2013) (17)
- Your processor leaks information — and there's nothing you can do about it (2016) (17)
- SoK: Benchmarking Flaws in Systems Security (2019) (16)
- A Distributed Single Address-Space Operating System Supporting Persistence (1993) (16)
- Itanium Page Tables and TLB (2003) (16)
- Correct, fast, maintainable: choose any three! (2012) (16)
- Protection domain extensions in Mungi (1996) (16)
- It's Time for Trustworthy Systems (2012) (15)
- Supporting Persistent Object Systems in a Single Address Space (1996) (15)
- Distribution + persistence = global virtual memory (1992) (15)
- Mixed-Criticality Support in a High-Assurance, General-Purpose Microkernel (2014) (15)
- Inter-Disciplinary Research Challenges in Computer Systems for the 2020s (2018) (15)
- Many-core chips — a case for virtual shared memory (2009) (15)
- For a Microkernel, a Big Lock Is Fine (2015) (14)
- The road to trustworthy systems (2010) (14)
- High-performance microkernels and virtualisation on ARM and segmented architectures (2007) (12)
- Encapsulated user-level device drivers in the Mungi operating system (2004) (11)
- Can We Prove Time Protection? (2019) (11)
- For Safety’s Sake: We Need a New Hardware-Software Contract! (2018) (11)
- Page tables for 64-bit computer systems (1999) (10)
- Secure mathematically-assured composition of control models (2017) (10)
- Improved device driver reliability through hardware verification reuse (2011) (10)
- The Cogent Case for Property-Based Testing (2017) (10)
- What If You Could Actually Trust Your Kernel? (2011) (10)
- Inside L4/MIPS: Anatomy of a high-performance microkernel (2001) (10)
- Contemporary Processors Are Leaky -- and There's Nothing You Can Do About It (2016) (10)
- Design and implementation of a three-dimensional, general purpose semiconductor device simulator (1991) (10)
- seL4 in Australia: From Research to Real-World Trustworthy Systems (2020) (9)
- High-assurance timing analysis for a high-assurance real-time operating system (2017) (9)
- Components + security = OS extensibility (2001) (9)
- Mathematically verified software kernels: Raising the bar for high assurance implementations (2014) (8)
- Protected hard real-time: the next frontier (2011) (8)
- A Scalable Lock Manager for Multicores (2014) (8)
- A Performance Evaluation of Rump Kernels as a Multi-server OS Building Block on seL4 (2017) (8)
- Scheduling-context capabilities: A principled, light-weight OS mechanism for managing time (2018) (8)
- seL4 (2010) (8)
- Pre-virtualization: uniting two worlds (2005) (7)
- Static analysis of device drivers: we can do better! (2011) (7)
- seL4 in Australia (2020) (6)
- Formalising device driver interfaces (2007) (6)
- L4 Reference Manual MIPS R4x00 (1999) (6)
- Three Dimensional Transient Simulation of Complex Silicon Devices (1990) (5)
- Single Address Space Operating Systems (1990) (5)
- A Virtual Shared-Memory Multiprocessor (2009) (5)
- High-assurance timing analysis for a high-assurance real-time OS (2017) (5)
- A Portable Operating System Interface and Utility Library (1986) (5)
- It's Time: OS Mechanisms for Enforcing Asymmetric Temporal Integrity (2016) (5)
- Do Hardware Cache Flushing Operations Actually Meet Our Expectations? (2016) (5)
- Verifying a high-performance micro-kernel (2007) (4)
- Code optimizations using formally verified properties (2013) (4)
- L4 Reference Manual Alpha 21x64 (2001) (4)
- L4 reference manual: MIPS R4x00, version 1.11, kernel version 79 (1999) (4)
- To preempt or not to preempt, that is the question (2012) (4)
- Libra: A Library for Reliable Distributed Applications (1996) (4)
- The von Neumann Architecture Is Due for Retirement (2013) (4)
- Design and Implementation of the L4 Microkernel for Alpha Multiprocessors (2002) (4)
- Your System Is Secure? Prove It! (2007) (3)
- Fault Tolerance Through Redundant Execution on COTS Multicores: Exploring Trade-Offs (2019) (3)
- Trustworthy Real-Time Systems (2012) (3)
- Do microkernels suck (2008) (3)
- Towards Provable Timing-Channel Prevention (2020) (3)
- The seL4 Microkernel – An Introduction (2020) (3)
- Benchmarking Flaws Undermine Security Research (2020) (3)
- Variable Radix Page Table: A Page Table for Modern Architectures (2003) (3)
- OSSI: A portable operating system interface and utility library for Modula-2 (1987) (3)
- Architecture optimisation with currawong (2010) (3)
- A resource management framework for priority-based physical-memory allocation (2002) (2)
- Technical Perspective: Proving file systems meet expectations (2017) (2)
- FlaRe : Efficient Capability Semantics for Timely Processor Access (2013) (2)
- Proceedings of the 6th Australasian conference on Computer systems architecture (2001) (2)
- Trusted <= trustworthy <= proof — position paper (2009) (2)
- Fault tolerance and avoidance in biomedical systems (2002) (2)
- File systems deserve verification too! (2014) (2)
- Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments (2013) (2)
- Property-Based Testing: Climbing the Stairway to Verification (2022) (2)
- White Paper Protecting e-Government Against Attacks (2013) (2)
- Towards an OS platform for truly dependable real-time systems (2011) (1)
- Issues in Implementing Virtual Memory (1994) (1)
- Distribution + Persistence = Global Virtual Memory A Position Paper (1992) (1)
- Protecting e-government against attacks (2013) (1)
- Roundtable: Machine Learning for Embedded Systems: Hype or Lasting Impact? (2018) (1)
- An Evaluation of Coarse-Grained Locking for Multicore Microkernels (2016) (1)
- PERSONALIZED BATTERY LIFETIME PREDICTION FOR MOBILE DEVICES BASED ON USAGE PATTERNS (2015) (1)
- COURSE AND TEACHING EVALUATION AND IMPROVEMENT (CATEI) (2008) (1)
- Systematic Prevention of On-Core Timing Channels by Full Temporal Partitioning (2022) (1)
- Improved Device Driver Reliability Through Verification Reuse (2010) (1)
- COURSE AND TEACHING EVALUATION AND IMPROVEMENT (CATEI) (2008) (1)
- A secure, language independent, high performance component interface (2004) (1)
- Secure OS extensibility needn't cost an arm and a leg (2001) (1)
- Itanium - A System Implementor's Tale(Awarded General Track Best Student Paper Award!) (2005) (1)
- Architecture optimisation with Currawong (2010) (0)
- Automatic Synthesis of High-Assurance Device Drivers (2013) (0)
- Session details: Virtualization (2011) (0)
- Secure Embedded Systems Need Microkernels Embedded Systems Security Threats (2005) (0)
- Operating Systems Technology for Converged ECUs Extended (2008) (0)
- seL4 is free – what does this mean for you? (2015) (0)
- Distributed Systems What is a distributed system ? (2020) (0)
- The role of language technology in trustworthy operating systems (2011) (0)
- COMP 9243 — Lecture 3 ( 20 T 3 ) (2020) (0)
- seL4: seL4 3.0.1 (2016) (0)
- Dealing With TLB Tags or I Want to Build a System, What Can L4 Do for Me? (2001) (0)
- Session details: OS (2013) (0)
- COMP 9243 — Lecture 7 ( 19 T 3 ) (2019) (0)
- 6th Australasian Computer Systems Architecture Conference (ACSAC 2001), 29-30 January 2001, Gold Coast, Queensland, Australia (2001) (0)
- The L4 microkernel — from research to mass deployment and back (2010) (0)
- Low-overhead virtualization of mobile systems (2011) (0)
- Generalised radix page table: A page table for modern architectures (2003) (0)
- Session details: OS Security (2008) (0)
- 5th Australasian Computer Architecture Conference (2000) (0)
- Session details: Session 3B: Security I (2016) (0)
- The Design and Implementation of (2010) (0)
- seL4: seL4 Rt Extensions (in development) (2016) (0)
- Enhancing IA-64 Memory Management (2007) (0)
- Molecular dynamics calculation of mean square displacement in alkali metals and rare gas solids and comparison with lattice dynamics (1984) (0)
- Towards trustworthy systems (2011) (0)
- COMP 9243 — Week 7 b ( 15 s 1 ) (2015) (0)
- Design and implementation of a three-dimensional, general purpose semiconductor device simulatior (1991) (0)
- Comp9243 — Week 6 (08s1) Synchronisation and Coordination (part 2) Coordination and Multicast (2008) (0)
- COMP 9243 — Week 1 ( 17 s 1 ) (2017) (0)
- Comp9243 — Week 5 (08s1) Synchronisation & Coordination Time & Clocks (2008) (0)
- Session details: OS (2013) (0)
- Microarchitectural Timing Channels and their Prevention on an Open-Source 64-bit RISC-V Core (2021) (0)
- COMP 9243 — Week 8 b ( 17 s 1 ) (2017) (0)
- Client ’ s Perspective : File Services (2019) (0)
- Cogent Code C ADTsADT Embedding Pr oo f Pr oo f Haskell Abstract Spec Haskell Embedding Te sts Haskell ADTs C FFI Automatic Manual Semi-Automatic Code Generation Dependency Isabelle / HOL Haskell System Code (2017) (0)
- State of the Journal (2016) (0)
- Session details: Session 3B: Security I (2016) (0)
- COMP 9243 — Week 2 ( 08 s 1 ) (2008) (0)
- COMP 9243 — Week 4 ( 10 s 1 ) (1985) (0)
- Low-overhead virtualization of mobile platforms (2011) (0)
- COMP 9243 — Week 10 ( 08 s 1 ) (2008) (0)
- Session details: Session 3B: Security I (2016) (0)
- Report on the Asia-Pacific Systems Workshop 2015 (APSys'15) (2016) (0)
- Operating System Verification for Real Use (2008) (0)
- Can truly dependable systems be affordable (2013) (0)
- Dealing with TLB tags (2001) (0)
- Formalising the Prevention of Microarchitectural Timing Channels by Operating Systems (2023) (0)
- Hardware ! Microkernel ! Linux ! Server ! Legacy App . ! Legacy App . ! Legacy Apps ! Trusted ! Service ! Sensitive ! App ! Trusted ! Untrusted ! Policy Layer ! (2012) (0)
- Session details: OS (2013) (0)
- Chapter 1 Trustworthy Real-Time Systems (2012) (0)
- Panel: Is University Systems Teaching and Research Relevant to Industry? (2006) (0)
- A survey of microarchitectural timing attacks and countermeasures on contemporary hardware (2016) (0)
- seL4: seL4 2.10 (minor release) (2016) (0)
- 5th Australasian Computer Architecture Conference (ACAC 2000), 31 January - 3 February 2000, Canberra, Australia (2000) (0)
- A mere formality (2009) (0)
- Tracing Kernel Activity in Sunos 4.0 (1994) (0)
- Synchronisation and Coordination ( Part 2 ) Coordination and Multicast Recall (2010) (0)
- COMP 9243 — Lecture 11 ( 19 T 3 ) (2019) (0)
- Kernel Development for High Assurance (2007) (0)
- Scalability of Microkernel-Based Systems (2005) (0)
- L 4 Cars Kevin Elphinstone Gernot Heiser Ralf Huuck (2005) (0)
- Roundtable: Machine learning for embedded systems (2018) (0)
- seL4: seL4 2.0.0 (2015) (0)
- seL4: Present and future (2015) (0)
- High-assurance timing analysis for a high-assurance real-time operating system (2017) (0)
- Enhancing IA64 memory management (2001) (0)
- Secure Embedded Systems Need Microkernels Gernot Heiser (0)
This paper list is powered by the following services:
Other Resources About Gernot Heiser
What Schools Are Affiliated With Gernot Heiser?
Gernot Heiser is affiliated with the following schools: