-
5
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
0024085322
-
Garbage collection in an uncooperative environment
-
H.-J. Boehm and M. Weiser. Garbage collection in an uncooperative environment. Software - Practice and Experience, 18 (9):807-820, 1988.
-
(1988)
Software - Practice and Experience
, vol.18
, Issue.9
, pp. 807-820
-
-
Boehm, H.-J.1
Weiser, M.2
-
7
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Aug
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-Control-Data Attacks Are Realistic Threats. In Proceedings of the USENIX Security Symposium, Aug. 2005.
-
(2005)
Proceedings of the USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
9
-
-
70350613514
-
Dependent types for low-level programming
-
Apr
-
J. Condit, M. Harren, Z. Anderson, D. Gay, and G. Necula. Dependent types for low-level programming. In Proceedings of th e Europea n Symposium on Programming (ESOP), Apr. 2007.
-
(2007)
Proceedings of Th e Europea N Symposium on Programming (ESOP)
-
-
Condit, J.1
Harren, M.2
Anderson, Z.3
Gay, D.4
Necula, G.5
-
10
-
-
0038716438
-
CCured in the real world
-
June
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer. CCured in the Real World. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), June 2003.
-
(2003)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
12
-
-
77952347046
-
-
F-Secure. F-secure blacklight. http://www.f-secure.com/blacklight/ blacklight.html, 2007.
-
(2007)
F-secure Blacklight
-
-
-
13
-
-
21644455412
-
Terra: A virtual-machine based platform for trusted computing
-
Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual-Machine Based Platform for Trusted Computing. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
17
-
-
85084164164
-
Cyclone: A safe dialect of C
-
June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In Proceedings of the USENIX Annual Technical Conference, June 2002.
-
(2002)
Proceedings of the USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
19
-
-
77952402666
-
-
T. Klein. Rootkit profiler LX. http://www.trapkit. de/research/ rkprofiler/rkplx/rkplx.html, 2007.
-
(2007)
Rootkit Profiler LX
-
-
Klein, T.1
-
25
-
-
77952387152
-
Automated detection of persistent kernel control-flow attacks (extended version)
-
Department of Computer Science, University of Maryland, Sep
-
N. L. Petroni and M. Hicks. Automated detection of persistent kernel control-flow attacks (extended version). Technical Report CS-TR-4880, Department of Computer Science, University of Maryland, Sep. 2007.
-
(2007)
Technical Report CS-TR-4880
-
-
Petroni, N.L.1
Hicks, M.2
-
29
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Oct
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2005.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
33
-
-
77952348064
-
-
SPEC. Standard Performance Evaluation Corporation
-
SPEC. Standard Performance Evaluation Corporation. http://www.spec.org, 2007.
-
(2007)
-
-
-
34
-
-
33746224293
-
Safe manual memory management in cyclone
-
Oct, Special issue on memory management
-
N. Swamy, M. Hicks, G. Morrisett, D. Grossman, and T. Jim. Safe manual memory management in cyclone. Science of Computer Programming (SCP), 62 (2):122-144, Oct. 2006. Special issue on memory management.
-
(2006)
Science of Computer Programming (SCP)
, vol.62
, Issue.2
, pp. 122-144
-
-
Swamy, N.1
Hicks, M.2
Morrisett, G.3
Grossman, D.4
Jim, T.5
-
38
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
Sep
-
X. Zhang, L. van Doorn, T. Jaeger, R. Perez, and R. Sailer. Secure Coprocessor-based Intrusion Detection. In Proceedings of the ACM SIGOPS European Workshop, Sep. 2002.
-
(2002)
Proceedings of the ACM SIGOPS European Workshop
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
-
39
-
-
84908296347
-
Safedrive: Safe and recoverable extensions using language-based techniques
-
Nov
-
F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. Safedrive: Safe and recoverable extensions using language-based techniques. In Proceedings of the Symposium on Operating System Design and Implementation (OSDI), Nov. 2006.
-
(2006)
Proceedings of the Symposium on Operating System Design and Implementation (OSDI)
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.7
Brewer, E.8
|