-
1
-
-
33846251803
-
-
4N6 Developers. The Forensix Project. .
-
-
-
-
2
-
-
33846254883
-
-
Armando Fox, David Patterson, Self-repairing computers, Scientific American, September 2004.
-
-
-
-
3
-
-
85030750455
-
-
P.T. Barham, A. Donnelly, R. Isaacs, R. Mortier, Using magpie for request extraction and workload modelling, in: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, 2004, pp. 259-272.
-
-
-
-
5
-
-
0030092390
-
Checking for race conditions in file accesses
-
Bishop M., and Dilger M. Checking for race conditions in file accesses. Computer Systems 9 2 (1996) 131-152
-
(1996)
Computer Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
6
-
-
33846186676
-
-
Bobbie Harder, Microsoft windows system restore, April 2001. .
-
-
-
-
7
-
-
85077561658
-
-
A.B. Brown, D.A. Patterson, Undo for operators: building an undoable e-mail store, in: Proceedings of the USENIX Technical Conference, 2003, pp. 1-14.
-
-
-
-
8
-
-
0036041121
-
-
J.S. Chase, D.C. Anderson, P.N. Thakar, A. Vahdat, R.P. Doyle, Managing energy and server resources in hosting centres, in: Proceedings of the Symposium on Operating Systems Principles, October 2001, pp. 103-116.
-
-
-
-
9
-
-
85084160792
-
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, M. Rosenblum, Understanding data lifetime via whole system simulation, in: Proceedings of the USENIX Security Symposium, August 2004, pp. 321-336.
-
-
-
-
10
-
-
0036184272
-
Protecting free expression online with Freenet
-
Clarke I., Hong T.W., Miller S.G., Sandberg O., and Wiley B. Protecting free expression online with Freenet. IEEE Internet Computing 6 1 (2002) 40-49
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Hong, T.W.2
Miller, S.G.3
Sandberg, O.4
Wiley, B.5
-
11
-
-
33846246975
-
-
C. Cowan, Immunix: Adaptive system survivability, 1998. , .
-
-
-
-
13
-
-
0036041927
-
-
F. Dabek, M.F. Kaashoek, D. Karger, R. Morris, I. Stoica, Wide-area cooperative storage with CFS, in: Proceedings of the Symposium on Operating Systems Principles, October 2001.
-
-
-
-
14
-
-
33846184546
-
-
G. Dunlap, S. King, S. Cinar, M. Basrai, P. Chen, ReVirt: Enabling intrusion analysis through virtual-machine logging and replay, in: Proceedings of OSDI, December 2002.
-
-
-
-
15
-
-
33846214696
-
-
S. Eckmann, G. Vigna, R. Kemmerer, STATL: An Attack Language for State-based Intrusion Detection. Technical report, 2000.
-
-
-
-
16
-
-
33846200267
-
-
Edward C. Bailey, Maximum RPM.Sams, August 1997.
-
-
-
-
17
-
-
84964540406
-
-
E. Eskin, W. Lee, S. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes, in: Proceedings of DARPA Information Survivability Converence and Exposition II, June 2001.
-
-
-
-
18
-
-
33846226353
-
-
T. Garfinkel, Traps and pitfalls: practical problems in system call interposition based security tools, in: Proceedings of the Network and Distributed System Security Symposium, February 2003.
-
-
-
-
19
-
-
85084162735
-
-
I. Goldberg, D. Wagner, R. Thomas, E.A. Brewer, A secure environment for untrusted helper applications, in: Proceedings of the USENIX Security Symposium, 1996.
-
-
-
-
21
-
-
33846191880
-
-
K. Ilgun, USTAT: A real-time intrusion detection system for UNIX, Technical report, 1992.
-
-
-
-
22
-
-
84988573115
-
-
G.H. Kim, E.H. Spafford, The design and implementation of tripwire: a file system integrity checker, in: ACM Conference on Computer and Communications Security, 1994, pp. 18-29.
-
-
-
-
23
-
-
33846211367
-
-
S.T. King, P.M. Chen, Backtracking intrusions, in: Proceedings of the Symposium on Operating Systems Principles, October 2003.
-
-
-
-
24
-
-
33846210505
-
-
C. Kruegel, D. Mutz, F. Valeur, G. Vigna, On the detection of anomalous system call arguments, in: ESORICS, 2003.
-
-
-
-
25
-
-
85084161679
-
-
P. Kumar, M. Satyanarayanan, Flexible and safe resolution of file conflicts, in: Proceedings of the USENIX Technical Conference, USENIX, January 1995, pp. 95-106.
-
-
-
-
26
-
-
33846206760
-
-
K. Mitnick, Takedown Transcripts: 1995 Feb 5 11:48:08, February 1995. .
-
-
-
-
27
-
-
33846254456
-
-
D. Pilania, T. cker Chiueh, Design, implementation, and evaluation of an intrusion resilient database system. Technical Report TR-124, SUNY, Stony Brook, April 2005.
-
-
-
-
28
-
-
33846220990
-
-
P. Porras, STAT: A state transition analysis tool for intrusion detection, Technical report, 1992.
-
-
-
-
29
-
-
84878346861
-
-
N. Provos, Improving host security with system call policies, in: Proceedings of the USENIX Security Symposium, August 2003, pp. 257-272.
-
-
-
-
30
-
-
33846205061
-
-
T. Ptacek, T. Newsham, Insertion, evasion, and denial of service: eluding network intrusion detection, Technical report, 1998.
-
-
-
-
31
-
-
85084160176
-
-
P. Reiher, J.S. Heidemann, D. Ratner, G. Skinner, G.J. Popek, Resolving file conflicts in the Ficus file system, in: USENIX Technical Conference, USENIX, June 1994, pp. 183-195.
-
-
-
-
32
-
-
85084160673
-
-
S. Quinlan, S. Dorward, Venti: A new approach to archival storage, in: Proceedings of Conference on File and Storage Technologies (FAST), January 2002.
-
-
-
-
33
-
-
0042352263
-
-
D.S. Santry, M.J. Feeley, N.C. Hutchinson, A.C. Veitch, R.W. Carton, J. Ofir, Deciding when to forget in the Elephant file system, in: Proceedings of the Symposium on Operating Systems Principles, December 1999, pp. 110-123.
-
-
-
-
34
-
-
33846236236
-
-
sd and devik.Linux on-the-fly kernel patching without LKM, Phrack (58), December 2001.
-
-
-
-
35
-
-
0034829697
-
-
R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, in: IEEE Symposium on Security and Privacy, May 2001.
-
-
-
-
36
-
-
85084163313
-
-
R. Sekar, P. Uppuluri, Synthesizing fast intrusion prevention/detection systems from high-level specifications, in: Proceedings of the USENIX Security Symposium, August 1999, pp. 63-78.
-
-
-
-
37
-
-
0032178369
-
-
J. Semke, J. Mahdavi, M. Mathis, Automatic TCP buffer tuning, in: Proceedings of the ACM SIGCOMM, 1998, pp. 315-323.
-
-
-
-
38
-
-
33846189256
-
-
Slashdot, Slashdot FAQ, 2000. .
-
-
-
-
39
-
-
85084164032
-
-
A. Somayaji, S. Forrest, Automated response using system-call delays, in: Proceedings of the USENIX Security Symposium, August 2000, pp. 185-198.
-
-
-
-
40
-
-
84885648386
-
-
C.A.N. Soules, G.R. Goodson, J.D. Strunk, G.R. Ganger, Metadata efficiency in versioning file systems, in: Proceedings of the USENIX Conference on File and Storage Technologies, 2003, pp. 43-58.
-
-
-
-
41
-
-
84978374045
-
-
J.D. Strunk, G.R. Goodson, M.L. Scheinholtz, C.A.N. Soules, G.R. Ganger, Self-securing storage: protecting data in compromised systems, in: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, 2000, pp. 165-180.
-
-
-
-
42
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Suh G.E., Lee J.W., Zhang D., and Devadas S. Secure program execution via dynamic information flow tracking. ACM SIGARCH Computer Architecture News 32 5 (2004) 85-96
-
(2004)
ACM SIGARCH Computer Architecture News
, vol.32
, Issue.5
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
43
-
-
33846195327
-
-
W. Sun, Z. Liang, R. Sekar, V. Venkatakrishnan, One-way isolation: an effective approach for realizing safe execution environments, in: Proceedings of the Network and Distributed System Security Symposium, February 2005.
-
-
-
-
44
-
-
33845192207
-
-
D.B. Terry, M.M. Theimer, K. Petersen, A.J. Demers, M.J. Spreitzer, C.H. Hauser, Managing update conflicts in Bayou, a weakly connected replicated storage system, in: Proceedings of the 15th Symposium on Operating Systems Principles, December 1995, pp. 172-183.
-
-
-
-
45
-
-
33846264845
-
-
The Honeynet Project and Research Alliance. Know Your Enemy: Phishing, May 2005. .
-
-
-
-
46
-
-
33846251802
-
-
H. Xie, P. Biondi, Linux Intrusion Detection System (LIDS) Project. .
-
-
-
-
47
-
-
1542360009
-
-
N. Zhu, T.-C. Chiueh, Design, implementation, and evaluation of repairable file service, in: Proceedings of the IEEE Dependable Systems and Networks, June 2003, pp. 217-226.
-
-
-
|