-
2
-
-
60349132217
-
-
ALCATEAZ. http://www.seclab.cs.sunysb.edu/alcatraz.
-
ALCATEAZ. http://www.seclab.cs.sunysb.edu/alcatraz.
-
-
-
-
3
-
-
60349131698
-
-
BOCHS. http://bochs.sourceforge.net.
-
BOCHS. http://bochs.sourceforge.net.
-
-
-
-
7
-
-
60349119931
-
-
CHUTANI, S., ANDERSON, O. T., KAZAR, M. L., LEVERETT, B. W., MASON, W. A., and SIDEBOTHAM, R. N. 1992. The episode file system. In Proceedings of the USENIX Technical Conference (USENIX'92).
-
CHUTANI, S., ANDERSON, O. T., KAZAR, M. L., LEVERETT, B. W., MASON, W. A., and SIDEBOTHAM, R. N. 1992. The episode file system. In Proceedings of the USENIX Technical Conference (USENIX'92).
-
-
-
-
8
-
-
33947108834
-
Chakravyuha: A sandbox operating system for the controlled execution of alien code
-
Tech. rep, IBM T.J. Watson Research Center
-
DAN, A., MOHINDRA, A., RAMASWAMI, R., AND SITARAM, D. 1997. Chakravyuha: A sandbox operating system for the controlled execution of alien code. Tech. rep., IBM T.J. Watson Research Center.
-
(1997)
-
-
DAN, A.1
MOHINDRA, A.2
RAMASWAMI, R.3
SITARAM, D.4
-
11
-
-
33845387415
-
The taser intrusion recovery system
-
GOEL, A., PO, K., FARHADI, K., LI, Z., AND DE LARA, E. 2005. The taser intrusion recovery system. SIGOPS Oper. Syst. Rev. 39, 5, 163-176.
-
(2005)
SIGOPS Oper. Syst. Rev
, vol.39
, Issue.5
, pp. 163-176
-
-
GOEL, A.1
PO, K.2
FARHADI, K.3
LI, Z.4
DE LARA, E.5
-
12
-
-
85084162735
-
-
GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. 1996. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the USENIX Security Symposium (SECURITY'96).
-
GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. 1996. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the USENIX Security Symposium (SECURITY'96).
-
-
-
-
13
-
-
60349131102
-
-
JAIN, K. AND SEKAR, R. 2000. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In Proceedings of the Annual Network and Distributed System Security (NDSS'00).
-
JAIN, K. AND SEKAR, R. 2000. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In Proceedings of the Annual Network and Distributed System Security (NDSS'00).
-
-
-
-
15
-
-
0003653892
-
Postmark: A new file system benchmark
-
Tech. rep. TR3022, Network Applicance Inc
-
KATCHER, J. 1997. Postmark: A new file system benchmark. Tech. rep. TR3022, Network Applicance Inc.
-
(1997)
-
-
KATCHER, J.1
-
17
-
-
33751032041
-
-
KING, S. T., CHEN, P. M., WANG, Y.-M., VERBOWSKI, C, WANG, H. J., AND LORCH, J. R. 2006. Subvirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy (SP'06).
-
KING, S. T., CHEN, P. M., WANG, Y.-M., VERBOWSKI, C, WANG, H. J., AND LORCH, J. R. 2006. Subvirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy (SP'06).
-
-
-
-
19
-
-
0015672289
-
A note on the confinement problem
-
LAMPSON, B. W. 1973. A note on the confinement problem. Comm. ACM 16, 10, 613-615.
-
(1973)
Comm. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
LAMPSON, B.W.1
-
20
-
-
84944734361
-
-
LIANG, Z., VENKATAKRISHNAN, V., AND SEKAR, R. 2003. Isolated program execution: An application transparent approach for executing untrusted programs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'03).
-
LIANG, Z., VENKATAKRISHNAN, V., AND SEKAR, R. 2003. Isolated program execution: An application transparent approach for executing untrusted programs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'03).
-
-
-
-
21
-
-
0034513874
-
Intrusion confinement by isolation in information systems
-
LIU, P., JAJODIA, S., AND MCCOLLUM, C.D. 2000. Intrusion confinement by isolation in information systems. J. Comput. Secur. 8.
-
(2000)
J. Comput. Secur
, vol.8
-
-
LIU, P.1
JAJODIA, S.2
MCCOLLUM, C.D.3
-
23
-
-
0034479192
-
-
MALKHI, D. AND REITER, M. K. 2000. Secure execution of Java applets using a remote playground. SOFTW. ENGIN. 26, 12.
-
MALKHI, D. AND REITER, M. K. 2000. Secure execution of Java applets using a remote playground. SOFTW. ENGIN. 26, 12.
-
-
-
-
24
-
-
85084162599
-
-
MUNISWAMY-REDDY, K.-K., WRIGHT, C. P., HIMMER, A. P., AND ZADOK, E. 2004. A versatile and user-oriented versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'04).
-
MUNISWAMY-REDDY, K.-K., WRIGHT, C. P., HIMMER, A. P., AND ZADOK, E. 2004. A versatile and user-oriented versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'04).
-
-
-
-
25
-
-
60349099164
-
-
ORMANDY, T. An empirical study into the security exposure to hosts of hostile virtualized environments. http://taviso.decsystem.org/virtsec. pdf.
-
ORMANDY, T. An empirical study into the security exposure to hosts of hostile virtualized environments. http://taviso.decsystem.org/virtsec. pdf.
-
-
-
-
26
-
-
84978437417
-
The design and implementation of zap: A system for migrating computing environments
-
OSMAN, S., SUBHRAVETI, D., SU, G., AND NIEH, J. 2002. The design and implementation of zap: A system for migrating computing environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI'02).
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI'02)
-
-
OSMAN, S.1
SUBHRAVETI, D.2
SU, G.3
NIEH, J.4
-
28
-
-
33244459008
-
-
6.1b3 edition, July 2003
-
PENDRY, J. S., WILLIAMS, N., AND ZADOK, E. Am-utils user manual, 6.1b3 edition, July 2003. http://www.am-utils.org.
-
Am-utils user manual
-
-
PENDRY, J.S.1
WILLIAMS, N.2
ZADOK, E.3
-
29
-
-
60349088790
-
-
PETERSON, Z. AND BURNS, R. 2003. Ext3cow: The design, implementation, and analysis of metadata for a time-shifting file system. Tech. rep. HSSL-2003-03, Hopkins Storage Systems Lab, Department of Computer Science, Johns Hopkins University.
-
PETERSON, Z. AND BURNS, R. 2003. Ext3cow: The design, implementation, and analysis of metadata for a time-shifting file system. Tech. rep. HSSL-2003-03, Hopkins Storage Systems Lab, Department of Computer Science, Johns Hopkins University.
-
-
-
-
37
-
-
0032645761
-
Elephant: The file system that never forgets
-
SANTRY, D. J., FEELEY, M. J., HUTCHINSON, N. C, AND VEITCH, A. C. 1999. Elephant: The file system that never forgets. In Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS'99).
-
(1999)
Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS'99
-
-
SANTRY, D.J.1
FEELEY, M.J.2
HUTCHINSON, N.C.3
VEITCH, A.C.4
-
41
-
-
60349083965
-
-
SOFTGRID. http://www.microsoft.com/systemcenter/softgrid/ default.mspx.
-
SOFTGRID. http://www.microsoft.com/systemcenter/softgrid/ default.mspx.
-
-
-
-
42
-
-
60349121152
-
-
SOULES, C., GOODSON, G., STRUNK, J., AND GANGER, G. 2002. Metadata efficiency in a comprehensive versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'02).
-
SOULES, C., GOODSON, G., STRUNK, J., AND GANGER, G. 2002. Metadata efficiency in a comprehensive versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'02).
-
-
-
-
43
-
-
60349121936
-
-
STRACE. http://www.liacs.nl/~wichert/strace.
-
STRACE. http://www.liacs.nl/~wichert/strace.
-
-
-
-
44
-
-
84969564072
-
One-way isolation: An effective approach for realizing safe execution environments
-
SUN, W., LIANG, Z., SEKAR, R., AND VENKATAKRISHNAN, V. 2005. One-way isolation: An effective approach for realizing safe execution environments. In Proceedings of the ISOC Network and Distributed Systems Symposium (NDSS'05).
-
(2005)
Proceedings of the ISOC Network and Distributed Systems Symposium (NDSS'05
-
-
SUN, W.1
LIANG, Z.2
SEKAR, R.3
VENKATAKRISHNAN, V.4
-
46
-
-
60349083964
-
-
TFS. Translucent file system. SunOS Reference Manual, Sun Microsystems
-
TFS. Translucent file system. SunOS Reference Manual, Sun Microsystems.
-
-
-
-
49
-
-
84868867420
-
-
VIRTUALPC. http://www.microsoft.com/windows/products/winfamily/ virtualpc/default.mspx.
-
, vol.IRTUAL
, Issue.PC
-
-
-
50
-
-
60349127235
-
-
VMWARE. http://www.vmware.com.
-
VMWARE. http://www.vmware.com.
-
-
-
-
51
-
-
84868888601
-
-
VMWARE. VMware Converter. http://www.vmware.com/products/ converter.
-
VMware Converter
-
-
-
52
-
-
60349131448
-
-
WEBSTONE. http://www.mindcraft.com/webstone.
-
WEBSTONE. http://www.mindcraft.com/webstone.
-
-
-
-
54
-
-
60349095324
-
-
YU, Y., GUO, F., NANDA, S., CHUNG LAM, L., AND CKER CHIUEH, T. 2006. A feather-weight virtual machine for windows applications. In Proceedings of the 2nd ACM / USENIX Conference on Virtual Execution Environments (VEE'06).
-
YU, Y., GUO, F., NANDA, S., CHUNG LAM, L., AND CKER CHIUEH, T. 2006. A feather-weight virtual machine for windows applications. In Proceedings of the 2nd ACM / USENIX Conference on Virtual Execution Environments (VEE'06).
-
-
-
-
56
-
-
33748866851
-
Data versioning systems
-
Tech. rep, Stony Brook University
-
ZHU, N. 2003. Data versioning systems. Tech. rep., Stony Brook University.
-
(2003)
-
-
ZHU, N.1
|