메뉴 건너뛰기




Volumn , Issue , 2006, Pages 53-60

Limiting trust in the storage stack

Author keywords

Pointer corruption; Type aware corruption; Verifiable invariants

Indexed keywords

POINTER CORRUPTION; TRUSTWORTHINESS; TYPE-AWARE CORRUPTION; VERIFIABLE INVARIANTS;

EID: 34547452351     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179559.1179569     Document Type: Conference Paper
Times cited : (1)

References (27)
  • 4
    • 84858095706 scopus 로고    scopus 로고
    • R. Green. EIDE Controller Flaws Version 24, 2005
    • R. Green. EIDE Controller Flaws Version 24. http://mindprod.com/jgloss/ eideflaw.html, 2005.
  • 10
    • 84976682539 scopus 로고    scopus 로고
    • M. K. McKusick, W. N. Joy, S. J. Leffler, and R. S. Fabry. A Fast File System for UNIX. ACM Transactions on Computer Systems, 2(3):181-197, August 1984.
    • M. K. McKusick, W. N. Joy, S. J. Leffler, and R. S. Fabry. A Fast File System for UNIX. ACM Transactions on Computer Systems, 2(3):181-197, August 1984.
  • 26
    • 33751060454 scopus 로고    scopus 로고
    • Automatically Generating Malicious Disks using Symbolic Execution
    • Berkeley, California, May
    • J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler. Automatically Generating Malicious Disks using Symbolic Execution. In IEEE Security and Privacy, Berkeley, California, May 2006.
    • (2006) IEEE Security and Privacy
    • Yang, J.1    Sar, C.2    Twohey, P.3    Cadar, C.4    Engler, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.