-
2
-
-
34548741648
-
-
The marsaglia random number cdrom including the diehard battery of tests of randomness. G Marsaglia - See http://stat.fsu.edu/pub/diehard, 1996.
-
The marsaglia random number cdrom including the diehard battery of tests of randomness. G Marsaglia - See http://stat.fsu.edu/pub/diehard, 1996.
-
-
-
-
7
-
-
85084162914
-
-
N. L. P. Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security Symposium, 2004.
-
N. L. P. Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security Symposium, 2004.
-
-
-
-
8
-
-
84991799247
-
-
N. L. P. Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, 2006.
-
N. L. P. Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, 2006.
-
-
-
-
9
-
-
85028170979
-
-
R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. 12th USENIX Security Symposium, Washington DC, 09 2003.
-
R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. 12th USENIX Security Symposium, Washington DC, 09 2003.
-
-
-
-
11
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Trans. Comput. Syst., 24(2):115-139, 2006.
-
(2006)
ACM Trans. Comput. Syst
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
12
-
-
34548713267
-
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on tcp. sp, 00:0208, 1997.
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on tcp. sp, 00:0208, 1997.
-
-
-
-
13
-
-
33845427178
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. K. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP, pages 1-16, 2005.
-
(2005)
SOSP
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doom, L.5
Khosla, P.K.6
-
14
-
-
3042738543
-
-
A. Seshadri, A. Perrig, L. van Doom, and P. Khosla. Swatt: Software-based attestation for embedded devices. sp, 00:272, 2004.
-
A. Seshadri, A. Perrig, L. van Doom, and P. Khosla. Swatt: Software-based attestation for embedded devices. sp, 00:272, 2004.
-
-
-
-
16
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
E. Shi, A. Perrig, and L. van Doom. Bind: A fine-grained attestation service for secure distributed systems. In IEEE Symposium on Security and Privacy, pages 154-168, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
van Doom, L.3
-
18
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
X. Zhang, L. van Doom, T. Jaeger, R. Perez, and R. Sailer. Secure coprocessor-based intrusion detection. In Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC, 2002.
-
(2002)
Proceedings of the 10th workshop on ACM SIGOPS European workshop: Beyond the PC
-
-
Zhang, X.1
van Doom, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|