-
1
-
-
34547171412
-
-
http://x82.inetcop.org/h0me/papers/free-ur-mind.pdf.
-
-
-
-
3
-
-
0032000230
-
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
-
February
-
L. Alvisi and K. Marzullo. Message Logging: Pessimistic, Optimistic, Causal, and Optimal. IEEE Transactions on Software Engineering, 24(2):149-159, February 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.2
, pp. 149-159
-
-
Alvisi, L.1
Marzullo, K.2
-
4
-
-
34547171941
-
-
Web benchmark. http://www.serverwatch.com/news/article.php/ 10824_1133391_2.
-
Web benchmark
-
-
-
5
-
-
0030086704
-
Hypervisor-Based Fault Tolerance
-
February
-
T. C. Bressoud and F. B. Schneider. Hypervisor-Based Fault Tolerance. ACM TOCS, 14(1):80-107, February 1996.
-
(1996)
ACM TOCS
, vol.14
, Issue.1
, pp. 80-107
-
-
Bressoud, T.C.1
Schneider, F.B.2
-
6
-
-
0035703699
-
When Virtual, is Better than Real
-
May
-
P. M. Chen and B. D. Noble. When Virtual, is Better than Real. HotOS, May 2001.
-
(2001)
HotOS
-
-
Chen, P.M.1
Noble, B.D.2
-
7
-
-
0031633854
-
Deterministic Replay of Java Multithreaded Applications
-
August
-
J.-D. Choi and H. Srinivasan. Deterministic Replay of Java Multithreaded Applications. ACM SIGMETRICS SPDT, pages 48-59, August 1998.
-
(1998)
ACM SIGMETRICS SPDT
, pp. 48-59
-
-
Choi, J.-D.1
Srinivasan, H.2
-
8
-
-
21644482450
-
Minos: Control Data Attack Prevention Orthogonal to Memory Model
-
December
-
J. R. Crandall and F. T. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. MICRO, pages 221-232, December 2004.
-
(2004)
MICRO
, pp. 221-232
-
-
Crandall, J.R.1
Chong, F.T.2
-
9
-
-
33745788387
-
On Deriving Unknown Vulnerabilities from. Zero-Day Polymorphic and Metamorphic Worm. Exploits
-
November
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On Deriving Unknown Vulnerabilities from. Zero-Day Polymorphic and Metamorphic Worm. Exploits. ACM CCS, pages 235-248, November 2005.
-
(2005)
ACM CCS
, pp. 235-248
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
10
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev
, vol.36
, Issue.SI
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
11
-
-
0042078549
-
-
E. N. Elnozahy, L. Alvisi, Y-M. Wang, and D. B. Johnson. A. Survey of Rollback-Recovery Protocols in Message-Passing Systems. University of Michigan Technical Report CSE-TR-410, 34(3):375-408, September 2002.
-
E. N. Elnozahy, L. Alvisi, Y-M. Wang, and D. B. Johnson. A. Survey of Rollback-Recovery Protocols in Message-Passing Systems. University of Michigan Technical Report CSE-TR-410, 34(3):375-408, September 2002.
-
-
-
-
13
-
-
27544515395
-
BugNet: Continuously Recording Program Execution for Deterministic Replay Debugging
-
June
-
Z. Gutterman and B. Pinkas. BugNet: Continuously Recording Program Execution for Deterministic Replay Debugging. ISCA-32, pages 284-295, June 2005.
-
(2005)
ISCA-32
, pp. 284-295
-
-
Gutterman, Z.1
Pinkas, B.2
-
14
-
-
34547190442
-
-
Intel. IA-32 Intel Architecture Software Developer's Manual. 1, 2 and 3.
-
Intel. IA-32 Intel Architecture Software Developer's Manual. Volumes 1, 2 and 3.
-
-
-
-
15
-
-
33845409634
-
Detecting Past and Present Intrusions through Vulnerability-specifi c Predicates
-
October
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting Past and Present Intrusions through Vulnerability-specifi c Predicates. ACM SOSP, pages 91-104, October 2005.
-
(2005)
ACM SOSP
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
16
-
-
12344266149
-
Operating System Support for Virtual Machines
-
S. T. King, G. W. Dunlap, and P. M. Chen. Operating System Support for Virtual Machines. In USENIX, 2003.
-
(2003)
USENIX
-
-
King, S.T.1
Dunlap, G.W.2
Chen, P.M.3
-
19
-
-
0012991080
-
Discount Checking: Transparent, Low-Overhead Recovery for General Applications
-
CSE-TR-410-99
-
D. E. Lowell, and P. M. Chen. Discount Checking: Transparent, Low-Overhead Recovery for General Applications. University of Michigan Technical Report CSE-TR-410-99, 1998.
-
(1998)
University of Michigan Technical Report
-
-
Lowell, D.E.1
Chen, P.M.2
-
20
-
-
0038346243
-
-
M. Prvulovic and J. Torrellas. ReEnact: Using Thread-Level Speculation. Mechanisms to Debug Data Races in. Multithreaded Codes. ISCA-30, pages 110-121, June 2003.
-
M. Prvulovic and J. Torrellas. ReEnact: Using Thread-Level Speculation. Mechanisms to Debug Data Races in. Multithreaded Codes. ISCA-30, pages 110-121, June 2003.
-
-
-
-
21
-
-
33845429905
-
Rx: Treating Bugs as Allergies - A Safe Method to Survive Software Failures
-
October
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating Bugs as Allergies - A Safe Method to Survive Software Failures. ACM SOSP, pages 235-248, October 2005.
-
(2005)
ACM SOSP
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
22
-
-
20344383743
-
Virtual Machine Monitors: Current Technology and Future Trends
-
May
-
M. Rosenblum. and T. Garfinkel. Virtual Machine Monitors: Current Technology and Future Trends. IEEE Computer Society, 38(5):39-47, May 2005.
-
(2005)
IEEE Computer Society
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
23
-
-
0029712797
-
Supporting Nondetermmistic Execution in Fault-Tolerant Systems
-
J. Slye and E. Elnozahy. Supporting Nondetermmistic Execution in Fault-Tolerant Systems. FTCS, .1996.
-
(1996)
FTCS
-
-
Slye, J.1
Elnozahy, E.2
-
24
-
-
0032182041
-
Support for Software Interrupts in Log-Based Rollback-Recovery
-
October
-
J. H. Slye and E. N. Elnozahy. Support for Software Interrupts in Log-Based Rollback-Recovery. IEEE Transactions on Computers, 47(10):1113-1123, October 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.10
, pp. 1113-1123
-
-
Slye, J.H.1
Elnozahy, E.N.2
-
26
-
-
34547234338
-
-
Microsoft SQLIO. http://www.microsoft.com/downloads/.
-
Microsoft SQLIO
-
-
-
28
-
-
34547167742
-
-
UnixBench. http://www.tux.org/pub/tux/benchmarks/System/unixbench/.
-
UnixBench
-
-
-
29
-
-
20344391681
-
Rethinking the Design of Virtual Machine Monitors
-
May
-
A. Whitaker, R. S. Cox, M. Shaw, and S. D. dribble. Rethinking the Design of Virtual Machine Monitors. IEEE Computer, 38(5):57-62, May 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 57-62
-
-
Whitaker, A.1
Cox, R.S.2
Shaw, M.3
dribble, S.D.4
-
30
-
-
0038684791
-
A Flight Data Recorder for Enabling Full-System Multiprocessor Deterministic Replay
-
June
-
M. Xu, R. Bodik, and M. D. Hil. A Flight Data Recorder for Enabling Full-System Multiprocessor Deterministic Replay. ISCA-30, pages 122-133, June 2003.
-
(2003)
ISCA-30
, pp. 122-133
-
-
Xu, M.1
Bodik, R.2
Hil, M.D.3
-
31
-
-
34547197101
-
-
bochs: the Open Source IA-32 Emulation. Project (Home Page). http://bochs.sourceforge.net.
-
bochs: the Open Source IA-32 Emulation. Project (Home Page). http://bochs.sourceforge.net.
-
-
-
|