메뉴 건너뛰기




Volumn 43, Issue 3, 2008, Pages 308-318

Parallelizing security checks on commodity hardware

Author keywords

Operating Systems; Parallel; Performance; Security; Speculative Execution

Indexed keywords

COMPUTER HARDWARE; COMPUTER OPERATING SYSTEMS; DATA FLOW ANALYSIS; HARDWARE SECURITY; INFORMATION ANALYSIS; SECURITY SYSTEMS;

EID: 67650085302     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1353536.1346321     Document Type: Article
Times cited : (24)

References (34)
  • 10
    • 33845462269 scopus 로고    scopus 로고
    • Operating system I/O speculation: How two invocations are faster than one
    • San Antonio, TX, June
    • Keir Fraser and Fay Chang. Operating system I/O speculation: How two invocations are faster than one. In Proceedings of the 2003 USENIX Technical Conference, pages 325-338, San Antonio, TX, June 2003.
    • (2003) Proceedings of the 2003 USENIX Technical Conference , pp. 325-338
    • Fraser, K.1    Chang, F.2
  • 12
    • 67650083878 scopus 로고    scopus 로고
    • Jeffrey Katcher. PostMark: A new file system benchmark. Technical Report TR3022, Network Appliance, 1997. Tom Knight. An architecture for mostly functional languages. In Proceedings of the 1986 ACM conference on LISP and functional programming, pages 105-112, 1986.
    • Jeffrey Katcher. PostMark: A new file system benchmark. Technical Report TR3022, Network Appliance, 1997. Tom Knight. An architecture for mostly functional languages. In Proceedings of the 1986 ACM conference on LISP and functional programming, pages 105-112, 1986.
  • 18
    • 67650094334 scopus 로고    scopus 로고
    • James Newsome and Dawn Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In Proceedings of the 12th Network and Distributed Systems Security Symposium, February 2005.
    • James Newsome and Dawn Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In Proceedings of the 12th Network and Distributed Systems Security Symposium, February 2005.
  • 24
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Washington, D.C, August
    • Niels Provos. Improving host security with system call policies. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium
    • Provos, N.1
  • 26
    • 40349087553 scopus 로고    scopus 로고
    • Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting general security attacks
    • Orlando, FL
    • Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting general security attacks. In The 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '06), Orlando, FL, 2006.
    • (2006) The 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '06)
    • Qin, F.1    Wang, C.2    Li, Z.3
  • 34
    • 4644293534 scopus 로고    scopus 로고
    • Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 2004 International Symposium on Computer Architecture, June 2004.
    • Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 2004 International Symposium on Computer Architecture, June 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.