-
2
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
August
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In Proceedings of the 2005 USENIX Security Symposium, August 2005.
-
(2005)
Proceedings of the 2005 USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
4
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
Seattle, WA, October
-
Miguel Castro, Manuel Costa, and Tim Harris. Securing software by enforcing data-flow integrity. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pages 147-160, Seattle, WA, October 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 147-160
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
6
-
-
34547192631
-
Log-Based Architectures for General-Purpose Monitoring of Deployed Code
-
October
-
Shimin Chen, Babak Falsafi, Phillip B. Gibbons, Michael Kozuch, Todd C. Mowry, Radu Teodorescu, Anastassia Ailamaki, Limor Fix, Gregory R. Ganger, Bin Lin, and Steven W. Schlosser. Log-Based Architectures for General-Purpose Monitoring of Deployed Code. 2006 Workshop on Architectural and System Support for Improving Software Dependability, October 2006.
-
(2006)
2006 Workshop on Architectural and System Support for Improving Software Dependability
-
-
Chen, S.1
Falsafi, B.2
Gibbons, P.B.3
Kozuch, M.4
Mowry, T.C.5
Teodorescu, R.6
Ailamaki, A.7
Fix, L.8
Ganger, G.R.9
Lin, B.10
Schlosser, S.W.11
-
7
-
-
84889030419
-
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation
-
August
-
Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. In Proceedings of the 2005 USENIX Security Symposium, pages 331-346, August 2005.
-
(2005)
Proceedings of the 2005 USENIX Security Symposium
, pp. 331-346
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
8
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, United Kingdom, October
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: end-to-end containment of internet worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 133-147, Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Boston, MA, December
-
George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, and Peter M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pages 211-224, Boston, MA, December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
10
-
-
33845462269
-
Operating system I/O speculation: How two invocations are faster than one
-
San Antonio, TX, June
-
Keir Fraser and Fay Chang. Operating system I/O speculation: How two invocations are faster than one. In Proceedings of the 2003 USENIX Technical Conference, pages 325-338, San Antonio, TX, June 2003.
-
(2003)
Proceedings of the 2003 USENIX Technical Conference
, pp. 325-338
-
-
Fraser, K.1
Chang, F.2
-
11
-
-
34748845128
-
Practical Taint-based Protection using Demand Emulation
-
Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, and Steven Hand. Practical Taint-based Protection using Demand Emulation. In Proceedings of EuroSys 2006, 2006.
-
(2006)
Proceedings of EuroSys 2006
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
12
-
-
67650083878
-
-
Jeffrey Katcher. PostMark: A new file system benchmark. Technical Report TR3022, Network Appliance, 1997. Tom Knight. An architecture for mostly functional languages. In Proceedings of the 1986 ACM conference on LISP and functional programming, pages 105-112, 1986.
-
Jeffrey Katcher. PostMark: A new file system benchmark. Technical Report TR3022, Network Appliance, 1997. Tom Knight. An architecture for mostly functional languages. In Proceedings of the 1986 ACM conference on LISP and functional programming, pages 105-112, 1986.
-
-
-
-
14
-
-
84887095037
-
Pulse: A dynamic deadlock detection mechanism using speculative execution
-
April
-
Tong Li, Carla S. Ellis, Alvin R. Lebeck, and Daniel J. Sorin. Pulse: A dynamic deadlock detection mechanism using speculative execution. In Proceedings of the 2005 USENIX Technical Conference, 31-44, April 2005.
-
(2005)
Proceedings of the 2005 USENIX Technical Conference
, pp. 31-44
-
-
Li, T.1
Ellis, C.S.2
Lebeck, A.R.3
Sorin, D.J.4
-
15
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
Chicago, IL, June
-
Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Programming Language Design and Implementation, pages 190-200, Chicago, IL, June 2005.
-
(2005)
Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Janapa Reddi, V.8
Hazelwood, K.9
-
16
-
-
85084164499
-
Avfs: An on-access anti-virus file system
-
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, and Erez Zadok. Avfs: An on-access anti-virus file system. In Proceedings of the 13th USENIX Security Symposium, pages 73-88, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 73-88
-
-
Miretskiy, Y.1
Das, A.2
Wright, C.P.3
Zadok, E.4
-
18
-
-
67650094334
-
-
James Newsome and Dawn Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In Proceedings of the 12th Network and Distributed Systems Security Symposium, February 2005.
-
James Newsome and Dawn Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In Proceedings of the 12th Network and Distributed Systems Security Symposium, February 2005.
-
-
-
-
19
-
-
84885629677
-
Speculative execution in a distributed file system
-
Brighton, United Kingdom, October
-
Edmund B. Nightingale, Peter M. Chen, and Jason Flinn. Speculative execution in a distributed file system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 191-205, Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 191-205
-
-
Nightingale, E.B.1
Chen, P.M.2
Flinn, J.3
-
20
-
-
41149089633
-
Rethink the sync
-
Seattle, WA, October
-
Edmund B. Nightingale, Kaushik Veeraraghavan, Peter M. Chen, and Jason Flinn. Rethink the sync. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pages 1-14, Seattle, WA, October 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Nightingale, E.B.1
Veeraraghavan, K.2
Chen, P.M.3
Flinn, J.4
-
24
-
-
84878346861
-
Improving host security with system call policies
-
Washington, D.C, August
-
Niels Provos. Improving host security with system call policies. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Provos, N.1
-
25
-
-
84885578759
-
Rx: Treating bugs as allergies-a safe method to survive software failures
-
Brighton, United Kingdom, October
-
Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou. Rx: Treating bugs as allergies-a safe method to survive software failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 235-248, Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
26
-
-
40349087553
-
Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting general security attacks
-
Orlando, FL
-
Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting general security attacks. In The 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '06), Orlando, FL, 2006.
-
(2006)
The 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '06)
-
-
Qin, F.1
Wang, C.2
Li, Z.3
-
29
-
-
85027866215
-
Dynamic native optimization of interpreters
-
G. T. Sullivan, D. L. Bruening, I. Baron, T. Garnett, and S. Amarasinghe. Dynamic native optimization of interpreters. In Proceedings of the Workshop on Interpreters, Virtual Machines and Emulators, 2003.
-
(2003)
Proceedings of the Workshop on Interpreters, Virtual Machines and Emulators
-
-
Sullivan, G.T.1
Bruening, D.L.2
Baron, I.3
Garnett, T.4
Amarasinghe, S.5
-
34
-
-
4644293534
-
-
Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 2004 International Symposium on Computer Architecture, June 2004.
-
Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 2004 International Symposium on Computer Architecture, June 2004.
-
-
-
|