-
1
-
-
33646767376
-
Controlflow integrity: Principles, implementations, and applications
-
November
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Controlflow integrity: Principles, implementations, and applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0011730379
-
-
M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A new kernel foundation for UNIX development. pages 93-112, 1986.
-
(1986)
Mach: New Kernel Foundation for UNIX Development
, pp. 93-112
-
-
Accetta, M.1
Baron, R.2
Bolosky, W.3
Golub, D.4
Rashid, R.5
Tevanian, A.6
Young, M.7
-
3
-
-
0029723619
-
Efficient and language-independent mobile programs
-
A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and language-independent mobile programs. SIGPLAN Not., 31(5):127-136, 1996.
-
(1996)
SIGPLAN Not.
, vol.31
, Issue.5
, pp. 127-136
-
-
Adl-Tabatabai, A.1
Langdale, G.2
Lucco, S.3
Wahbe, R.4
-
4
-
-
70449684546
-
AMD64 architecture programmer's manual, volume 1: Application programming
-
Publication number: 24592, September
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual, Volume 1: Application Programming. Advanced Micro Devices, September 2007. Publication number: 24592.
-
(2007)
Advanced Micro Devices
-
-
-
5
-
-
70449690534
-
-
Autoconf. http://www.gnu.org/software/autoconf/.
-
Autoconf.
-
-
-
6
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In 19th ACM Symposium on Operating Systems Principles, pages 164-177, 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Ho, A.5
Neugebauer, R.6
Pratt, I.7
Warfield, A.8
-
7
-
-
0031269854
-
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
-
E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running commodity operating systems on scalable multiprocessors. ACM Transactions on Computer Systems, 15(4):412-447, November 1997. (Pubitemid 127449841)
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
, pp. 412-447
-
-
Bugnion, E.1
Devine, S.2
Govil, K.3
Rosenblum, M.4
-
10
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
K. Campbell, L. Gordon, M. Loeb, and L. Zhou. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3):431-448, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.2
Loeb, M.3
Zhou, L.4
-
13
-
-
0027684663
-
Defense-in-depth against computer viruses
-
F. B. Cohen. Defense-in-depth against computer viruses. Computers and Security, 11(6):565-584, 1993.
-
(1993)
Computers and Security
, vol.11
, Issue.6
, pp. 565-584
-
-
Cohen, F.B.1
-
16
-
-
70449649125
-
Directorate for command, control, communications and computer systems
-
U.S. Department of Defense Joint Staff. Information assurance through defense-in-depth, Directorate for Command, Control, Communications and Computer Systems, February
-
Directorate for Command, Control, Communications and Computer Systems, U.S. Department of Defense Joint Staff. Information assurance through defense-in-depth. Technical report, Directorate for Command, Control, Communications and Computer Systems, U.S. Department of Defense Joint Staff, February 2000.
-
(2000)
Technical Report, U.S. Department of Defense Joint Staff
-
-
-
18
-
-
70449693516
-
XDR: External data representation
-
M. Eisler (editor)
-
M. Eisler (editor). XDR: External data representation. Internet RFC 4506, 2006.
-
(2006)
Internet RFC 4506
-
-
-
19
-
-
78651539599
-
XFI: Software guards for system address spaces
-
November
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula. XFI: Software guards for system address spaces. In OSDI '06: 7th Symposium on Operating Systems Design And Implementation, pages 75-88, November 2006.
-
(2006)
OSDI '06: 7th Symposium on Operating Systems Design and Implementation
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
20
-
-
70449696425
-
VXA: A virtual architecture for durable compressed archives
-
December
-
B. Ford. VXA: A virtual architecture for durable compressed archives. In USENIX File and Storage Technologies, December 2005.
-
(2005)
USENIX File and Storage Technologies
-
-
Ford, B.1
-
23
-
-
84871262255
-
-
GNU binutils. http://www.gnu.org/software/binutils/.
-
GNU Binutils
-
-
-
25
-
-
0038145552
-
UNIX as an application program
-
D. Golub, A. Dean, R. Forin, and R. Rashid. UNIX as an application program. In Proceedings of the Summer 1990 USENIX Conference, pages 87-95, 1990.
-
(1990)
Proceedings of the Summer 1990 USENIX Conference
, pp. 87-95
-
-
Golub, D.1
Dean, A.2
Forin, R.3
Rashid, R.4
-
26
-
-
84873306298
-
-
Google Inc. Protocol buffers. http://code.google.com/p/protobuf/.
-
Protocol Buffers
-
-
-
30
-
-
33745212805
-
An overview of the singularity project
-
Microsoft Research, October
-
G. Hunt, J. Larus, M. Abadi, M. Aiken, P. Barham, M. Fahndrich, C. Hawblitzel, O. Hodson, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. Zill. An overview of the Singularity project. Technical Report MSRTR- 2005-2135, Microsoft Research, October 2005.
-
(2005)
Technical Report MSRTR-2005-2135
-
-
Hunt, G.1
Larus, J.2
Abadi, M.3
Aiken, M.4
Barham, P.5
Fahndrich, M.6
Hawblitzel, C.7
Hodson, O.8
Levi, S.9
Murphy, N.10
Steensgaard, B.11
Tarditi, D.12
Wobber, T.13
Zill, B.14
-
37
-
-
70449656509
-
4.2 BSD system manual
-
University of California, Berkeley
-
W. Joy, E. Cooper, R. Fabry, S. Leffler, K. McKusick, and D. Mosher. 4.2 BSD system manual. Technical report, Computer Systems Research Group, University of California, Berkeley, 1983.
-
(1983)
Technical Report, Computer Systems Research Group
-
-
Joy, W.1
Cooper, E.2
Fabry, R.3
Leffler, S.4
McKusick, K.5
Mosher, D.6
-
44
-
-
70449677049
-
-
Microsoft Corporation. Structured exception handling. http://msdn.microsoft.com/en-us/library/ms680657(VS.85).aspx, 2008.
-
(2008)
Structured Exception Handling
-
-
-
45
-
-
0036010442
-
Stackbased typed assembly language
-
G. Morrisett, K. Crary, N. Glew, and D. Walker. Stackbased typed assembly language. Journal of Functional Programming, 12(1):43-88, 2002.
-
(2002)
Journal of Functional Programming
, vol.12
, Issue.1
, pp. 43-88
-
-
Morrisett, G.1
Crary, K.2
Glew, N.3
Walker, D.4
-
47
-
-
0003975281
-
-
G. Nelson (editor), Prentice-Hall
-
G. Nelson (editor). System Programming in Modula-3. Prentice-Hall, 1991.
-
(1991)
System Programming in Modula-3
-
-
-
48
-
-
70449675366
-
-
Netscape Corporation
-
Netscape Corporation. Gecko plugin API reference. http://developer. mozilla.org/en/docs/Gecko-Plugin-API-Reference.
-
Gecko Plugin API Reference
-
-
-
49
-
-
34547423144
-
Locating system problems using dynamic instrumentation
-
July
-
V. Prasad, W. Cohen, F. Eigler, M. Hunt, J. Keniston, and J. Chen. Locating system problems using dynamic instrumentation. In 2005 Ottawa Linux Symposium, pages 49-64, July 2005.
-
(2005)
2005 Ottawa Linux Symposium
, pp. 49-64
-
-
Prasad, V.1
Cohen, W.2
Eigler, F.3
Hunt, M.4
Keniston, J.5
Chen, J.6
-
50
-
-
84878346861
-
Improving host security with system call policies
-
August
-
N. Provos. Improving host security with system call policies. In USENIX Security Symposium, August 2003.
-
(2003)
USENIX Security Symposium
-
-
Provos, N.1
-
52
-
-
70449649124
-
User-level sandboxing: A safe and efficient mechanism for extensibility
-
Boston University, Computer Science Department, Boston, MA
-
J. G. RichardWest. User-level sandboxing: a safe and efficient mechanism for extensibility. Technical Report TR-2003-2014, Boston University, Computer Science Department, Boston, MA, 2003.
-
(2003)
Technical Report TR-2003-2014
-
-
Richard West, J.G.1
-
54
-
-
70449696422
-
Cost of computer viruses top $10 billion already this year
-
August
-
M. Savage. Cost of computer viruses top $10 billion already this year. ChannelWeb, August 2001.
-
(2001)
Channel Web
-
-
Savage, M.1
-
59
-
-
0029720098
-
TIL: A type-directed optimizing compiler for ML
-
New York, NY, USA, ACM
-
D. Tarditi, G. Morrisett, P. Cheng, C. Stone, R. Harper, and P. Lee. TIL: a type-directed optimizing compiler for ML. In PLDI '96: Proceedings of the ACM SIGPLAN 1996 conference on Programming language design and implementation, pages 181-192, New York, NY, USA, 1996. ACM.
-
(1996)
PLDI '96: Proceedings of the ACM SIGPLAN 1996 Conference on Programming Language Design and Implementation
, pp. 181-192
-
-
Tarditi, D.1
Morrisett, G.2
Cheng, P.3
Stone, C.4
Harper, R.5
Lee, P.6
-
60
-
-
70449654999
-
-
W. Tarreau. ptrace documentation. http://www.linuxhq.com/kernel/v2.4/36- rc1/Documentation/ptrace.txt, 2007.
-
(2007)
Ptrace Documentation
-
-
Tarreau, W.1
-
61
-
-
0003969633
-
-
U. S. Department of Defense, Computer Security Center, December
-
U. S. Department of Defense, Computer Security Center. Trusted computer system evaluation criteria, December 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
62
-
-
0027836576
-
Efficient software-based fault isolation
-
December
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review, 27(5):203-216, December 1993.
-
(1993)
ACM SIGOPS Operating Systems Review
, vol.27
, Issue.5
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
64
-
-
70449675364
-
Document Object Model (DOM) level 1 specification
-
Number REC-DOM-Level-1-19981001, October
-
Document Object Model (DOM) Level 1 Specification. Number REC-DOM-Level-1-19981001. World Wide Web Consortium, October 1998.
-
(1998)
World Wide Web Consortium
-
-
|