-
4
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
1642398510
-
-
Prentice Hall, 1st edition, April
-
J. Dike. User Mode Linux. Prentice Hall, 1st edition, April 2006.
-
(2006)
User Mode Linux
-
-
Dike, J.1
-
7
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
December
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation, December 2002.
-
(2002)
Proceedings of the 2002 Symposium on Operating Systems Design and Implementation
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), October 2003.
-
(2003)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
11
-
-
84926427148
-
Survey of virtual machine research
-
June
-
R. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7:34-45, June 1974.
-
(1974)
IEEE Computer Magazine
, vol.7
, pp. 34-45
-
-
Goldberg, R.1
-
12
-
-
27144437024
-
On the feasibility of intrusion detection inside workstation disks
-
Technical Report CMU-PDL-03-106, Carnegie Mellon University
-
J. L. Griffin, A. Pennington, J. S. Bucy, D. Choundappan, N. Muralidharan, and G. R. Ganger. On the feasibility of intrusion detection inside workstation disks. Technical Report CMU-PDL-03-106, Carnegie Mellon University, 2003.
-
(2003)
-
-
Griffin, J.L.1
Pennington, A.2
Bucy, J.S.3
Choundappan, D.4
Muralidharan, N.5
Ganger, G.R.6
-
14
-
-
34547432611
-
Geiger: Monitoring the buffer cache in a virtual machine environment
-
San Jose, CA, October
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Geiger: Monitoring the buffer cache in a virtual machine environment. In Architectural Support for Programming Languages and Operating Systems (ASPLOS XII), San Jose, CA, October 2006.
-
(2006)
Architectural Support for Programming Languages and Operating Systems (ASPLOS XII)
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
15
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
Oct
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), pages 1-15, Oct 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-15
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
16
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
November
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11), November 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
20
-
-
84879848814
-
Application and analysis of the virtual machine approach to information system security and isolation
-
March
-
S. E. Madnick and J. J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation. In Proceedings of the Workshop on Virtual Computer Systems, pages 210-224, March 1973.
-
(1973)
Proceedings of the Workshop on Virtual Computer Systems
, pp. 210-224
-
-
Madnick, S.E.1
Donovan, J.J.2
-
21
-
-
48649090356
-
Nettop: A network on your desktop
-
Fall
-
R. Meushaw and D. Simard. Nettop: A network on your desktop. Tech Trend Notes (NSA), 9(4):3-11, Fall 2000.
-
(2000)
Tech Trend Notes (NSA)
, vol.9
, Issue.4
, pp. 3-11
-
-
Meushaw, R.1
Simard, D.2
-
22
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson, and G. R. Ganger. Storage-based intrusion detection: Watching storage activity for suspicious behavior. In Proceedings of the 12th USENIX Security Symposium, 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.N.4
Goodson, G.R.5
Ganger, G.R.6
-
24
-
-
48649099088
-
-
Qumranet, Inc. Kvm: Kernel-based virtualization driver
-
Qumranet, Inc. Kvm: Kernel-based virtualization driver.
-
-
-
-
27
-
-
33750248123
-
Building a MAC-based security architecture for the Xen opensource hypervisor
-
December
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn. Building a MAC-based security architecture for the Xen opensource hypervisor. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), December 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.7
van Doorn, L.8
-
28
-
-
19944423977
-
The protection of information in computer systems
-
July
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
29
-
-
85077206237
-
Semantically-smart disk systems
-
M. Sivathanu, V. Prabhakaran, F. I. Popovici, T. E. Denehy, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Semantically-smart disk systems. In Proceedings of FAST: 2nd USENIX Conference on File and Storage Technologies, 2003.
-
(2003)
Proceedings of FAST: 2nd USENIX Conference on File and Storage Technologies
-
-
Sivathanu, M.1
Prabhakaran, V.2
Popovici, F.I.3
Denehy, T.E.4
Arpaci-Dusseau, A.C.5
Arpaci-Dusseau, R.H.6
-
30
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-securing storage: Protecting data in compromised systems. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
|