-
1
-
-
70349298080
-
Semantics of transactional memory and automatic mutual exclusion
-
Jan
-
M. Abadi, A. Birrell, T. Harris, and M. Isard, Semantics of transactional memory and automatic mutual exclusion. In ACM POPL. Jan 2008.
-
(2008)
ACM POPL
-
-
Abadi, M.1
Birrell, A.2
Harris, T.3
Isard, M.4
-
2
-
-
84890865854
-
Access control based on execution history
-
M. Abadi and C. Fournet. Access control based on execution history. In NDSS, 2003.
-
(2003)
NDSS
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
70349294949
-
Compiler and runtime support for efficient software transactional memory
-
June
-
A. Adi-Tabatabai, B. T. Lewis, V. Menon, B. R. Murphy, B. Saha, and T. Shpeisman. Compiler and runtime support for efficient software transactional memory. In ACM PLDF, June 2006.
-
(2006)
ACM PLDF
-
-
Adi-Tabatabai, A.1
Lewis, B.T.2
Menon, V.3
Murphy, B.R.4
Saha, B.5
Shpeisman, T.6
-
5
-
-
84869607538
-
-
AspectJ project
-
AspectJ project, http://www.eclipse.org/aspectj.
-
-
-
-
6
-
-
70349284217
-
From stack inspection to access control: A security analysis for libraries
-
June
-
F. Besson, T. Blanc, C. Fournet, and A.D. Gordon. From stack inspection to access control: a security analysis for libraries. In IEEE CSFW, June 2004.
-
(2004)
IEEE CSFW
-
-
Besson, F.1
Blanc, T.2
Fournet, C.3
Gordon, A.D.4
-
7
-
-
70349287313
-
-
A. Birgisson and IJ. Erlingsson. An implementation and semantics for transactional memory introspection in Haskell. Technical Report RUTR-CS08007, Reykjavik University, Aug 2008.
-
A. Birgisson and IJ. Erlingsson. An implementation and semantics for transactional memory introspection in Haskell. Technical Report RUTR-CS08007, Reykjavik University, Aug 2008.
-
-
-
-
8
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Digler. Checking for race conditions in file accesses. Computer Systems, 9(2): 131-152, Spring 1996.
-
(1996)
Computer Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Digler, M.2
-
9
-
-
33244467287
-
Microreboot: A technique for cheap recovery
-
Dec
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot: A technique for cheap recovery. In USENIX OSDI, Dec 2004.
-
(2004)
USENIX OSDI
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
10
-
-
1542298420
-
Exception handling: A false sense of security
-
Nov
-
T. Cargill. Exception handling: A false sense of security. C++ Report, 6(9), Nov 1994.
-
(1994)
C++ Report
, vol.6
, Issue.9
-
-
Cargill, T.1
-
11
-
-
71049148170
-
When virtual is better than real
-
May
-
P. M. Chen and B. Noble. When virtual is better than real. In USENIX HotOS, May 2001.
-
(2001)
USENIX HotOS
-
-
Chen, P.M.1
Noble, B.2
-
12
-
-
12844287315
-
Exception handling
-
Technical Report RJ5724, IBM Research
-
F.Christian. Exception handling. Technical Report RJ5724, IBM Research, 1987.
-
(1987)
-
-
Christian, F.1
-
13
-
-
79952793792
-
Thread-safe dynamic binary transaction using transactional memory
-
Feb
-
J. Chung, M. Dalton, H. Kannan, and C. Kozyrakis. Thread-safe dynamic binary transaction using transactional memory. In IEEE HPCA, Feb 2008.
-
(2008)
IEEE HPCA
-
-
Chung, J.1
Dalton, M.2
Kannan, H.3
Kozyrakis, C.4
-
14
-
-
0001865043
-
A comparison of commercial and military computer security policies
-
May
-
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE S&P, May 1987.
-
(1987)
IEEE S&P
-
-
Clark, D.D.1
Wilson, D.R.2
-
15
-
-
0001429662
-
Exception handling and tolerance of software faults
-
Wiley
-
F. Cristian. Exception handling and tolerance of software faults. In Software Fault Tolerance. Wiley, 1995.
-
(1995)
Software Fault Tolerance
-
-
Cristian, F.1
-
16
-
-
11844249640
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec
-
G. W. Dunlap, S. T. King, S. Cinar. M. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In USENIX OSDI, Dec 2002.
-
(2002)
USENIX OSDI
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
18
-
-
35348853739
-
-
An effective hybrid transactional memory system with strong isolation guarantees, June
-
C. Cao Minh et al.. An effective hybrid transactional memory system with strong isolation guarantees. In ISCA, June 2007.
-
(2007)
ISCA
-
-
Cao Minh, C.1
-
19
-
-
84870923642
-
LogTM: Log-based transactional memory
-
Feb
-
K. E. Moore et al. LogTM: Log-based transactional memory. In IEEE HPCA, Feb 2006.
-
(2006)
IEEE HPCA
-
-
Moore, K.E.1
-
20
-
-
4644359934
-
-
Transactional memory coherence and consistency, June
-
L. Hammond et al.. Transactional memory coherence and consistency. In ISCA, June 2004.
-
(2004)
ISCA
-
-
Hammond, L.1
-
21
-
-
70349287312
-
Supporting nested transactional memory in LogTM
-
Oct
-
M. J. Moravan et al.. Supporting nested transactional memory in LogTM. In ACM ASPLOS, Oct 2006.
-
(2006)
ACM ASPLOS
-
-
Moravan, M.J.1
-
22
-
-
70349290310
-
Hybrid transactional memory
-
Oct
-
P. Damron et al. Hybrid transactional memory. In ACM ASPLOS, Oct 2006.
-
(2006)
ACM ASPLOS
-
-
Damron, P.1
-
24
-
-
4344700755
-
Automatic detection and masking of nonatomic exception handling
-
C. Fetzer, P. Felber, and K. Hogstedt. Automatic detection and masking of nonatomic exception handling. IEEE Trans, on Software Engineering, 30(8):547-560, 2004.
-
(2004)
IEEE Trans, on Software Engineering
, vol.30
, Issue.8
, pp. 547-560
-
-
Fetzer, C.1
Felber, P.2
Hogstedt, K.3
-
25
-
-
70349291853
-
Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution
-
Mar
-
B. Fletcher. Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution. In Annual SELinux Symp., Mar 2006.
-
(2006)
Annual SELinux Symp
-
-
Fletcher, B.1
-
26
-
-
84869623532
-
-
FreeCS-the free chatserver
-
FreeCS-the free chatserver. http://freecs.sourceforge.net.
-
-
-
-
27
-
-
70349270356
-
Retrofitting legacy code for authorization policy enforcement
-
May
-
V. Ganapathy, T. Jaeger, and S. Jha. Retrofitting legacy code for authorization policy enforcement. In IEEE S&P, May 2006.
-
(2006)
IEEE S&P
-
-
Ganapathy, V.1
Jaeger, T.2
Jha, S.3
-
28
-
-
70349279672
-
Mining security-sensitive operations in legacy code using concept analysis
-
May
-
V. Ganapathy, D. King, T. Jaeger, and S. Jha. Mining security-sensitive operations in legacy code using concept analysis. In ACM/IEEE ICSE, May 2007.
-
(2007)
ACM/IEEE ICSE
-
-
Ganapathy, V.1
King, D.2
Jaeger, T.3
Jha, S.4
-
29
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
Feb
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, Feb 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
32
-
-
1442263994
-
Language support for lightweight transactions
-
T. Harris and K. Fraser. Language support for lightweight transactions. SIGPLANNoL, 38(1l):388-402, 2003.
-
(2003)
SIGPLANNoL
, vol.38
, Issue.1 L
, pp. 388-402
-
-
Harris, T.1
Fraser, K.2
-
34
-
-
34248153669
-
A flexible framework for implementing software transactional memory
-
Oct
-
M. Herlihy, V. Luchango, and M. Moir. A flexible framework for implementing software transactional memory. In ACM SIGPLAN OOPSLA, Oct 2006.
-
(2006)
ACM SIGPLAN OOPSLA
-
-
Herlihy, M.1
Luchango, V.2
Moir, M.3
-
35
-
-
28444462792
-
Software transactional memory for dynamic-sized data structures
-
July
-
M. Herlihy, V. Luchango, M. Moir, and W. Scherer. Software transactional memory for dynamic-sized data structures. In ACM PODC, July 2003.
-
(2003)
ACM PODC
-
-
Herlihy, M.1
Luchango, V.2
Moir, M.3
Scherer, W.4
-
37
-
-
3142518085
-
Consistency analysis of authorization hook placement in the Linux security modules framework
-
May
-
T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM TISSEC, 7(2): 175-205, May 2004.
-
(2004)
ACM TISSEC
, vol.7
, Issue.2
, pp. 175-205
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
40
-
-
24744432328
-
Securing the X Window system with SELinux
-
Technical Report 03-006, NAI Labs, Mar
-
D. Kilpatrick, W. Salamon, and C. Vance. Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, Mar 2003.
-
(2003)
-
-
Kilpatrick, D.1
Salamon, W.2
Vance, C.3
-
41
-
-
10644279224
-
Backtracking intrusions
-
Oct
-
S. T. King and P. M. Chen. Backtracking intrusions. In ACM SOSP, Oct 2003.
-
(2003)
ACM SOSP
-
-
King, S.T.1
Chen, P.M.2
-
42
-
-
35348922713
-
Transactional Memory. Synthesis Lectures on Computer Architecture
-
J. R. Larus and R. Rajwar. Transactional Memory. Synthesis Lectures on Computer Architecture. Morgan Claypool, 2006.
-
(2006)
Morgan Claypool
-
-
Larus, J.R.1
Rajwar, R.2
-
48
-
-
70349273468
-
TxLinux: Using and managing transactional memory in an operating system
-
Oct
-
C. J. Rossbach, O. S. Hofmann, D. E. Porter, H. E. Ramadan, A. Bhandari, and E. Witchel. TxLinux: Using and managing transactional memory in an operating system. In ACM SOSP, Oct 2007.
-
(2007)
ACM SOSP
-
-
Rossbach, C.J.1
Hofmann, O.S.2
Porter, D.E.3
Ramadan, H.E.4
Bhandari, A.5
Witchel, E.6
-
50
-
-
0001778364
-
Enforceable security policies
-
Feb
-
F. B. Schneider. Enforceable security policies. ACM TISSEC, 3(l):3O-5O, Feb 2000.
-
(2000)
ACM TISSEC
, vol.3
, Issue.L
-
-
Schneider, F.B.1
-
51
-
-
0012240184
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
Oct
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In USENIX OSDI, Oct 1996.
-
(1996)
USENIX OSDI
-
-
Seltzer, M.I.1
Endo, Y.2
Small, C.3
Smith, K.A.4
-
52
-
-
70349294947
-
Software transactional memory
-
Aug
-
N. Shavit and D. Touitou. Software transactional memory. In ACM PODC, Aug 1995.
-
(1995)
ACM PODC
-
-
Shavit, N.1
Touitou, D.2
-
53
-
-
70349301124
-
Enforcing isolation and ordering in STM
-
June
-
T. Shpeisman, V. Menon, A. Adl-Tabatabai, S. Balensiefer, D. Grossman, R. L. Hudson, K. F. Moore, and B. Saha. Enforcing isolation and ordering in STM. In ACM PLDI, June 2007.
-
(2007)
ACM PLDI
-
-
Shpeisman, T.1
Menon, V.2
Adl-Tabatabai, A.3
Balensiefer, S.4
Grossman, D.5
Hudson, R.L.6
Moore, K.F.7
Saha, B.8
-
56
-
-
70349296543
-
Integrating X.Org with security-enhanced Linux
-
Mar
-
E. Walsh. Integrating X.Org with security-enhanced Linux. In Annual SELinux Symp., Mar 2007.
-
(2007)
Annual SELinux Symp
-
-
Walsh, E.1
-
57
-
-
41149163668
-
Exceptional situations and program reliability
-
Mar
-
W. Weimer and G. C. Necula. Exceptional situations and program reliability. ACM TOPLAS, 30(2), Mar 2008.
-
(2008)
ACM TOPLAS
, vol.30
, Issue.2
-
-
Weimer, W.1
Necula, G.C.2
-
58
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
Aug
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security, Aug 2002.
-
(2002)
USENIX Security
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
59
-
-
70349291851
-
-
x11 perf: The X11 server performance test program suite.
-
x11 perf: The X11 server performance test program suite.
-
-
-
-
60
-
-
70349284216
-
-
The XI1 Server, version XI 1R6.8 (X.Org Foundation).
-
The XI1 Server, version XI 1R6.8 (X.Org Foundation).
-
-
-
-
61
-
-
36448939517
-
TightLip: Keeping applications from spilling the beans
-
April
-
A. Yumerefendi, B. Mickle, and L. Cox. TightLip: Keeping applications from spilling the beans. In USENIX NSDI, April 2007.
-
(2007)
USENIX NSDI
-
-
Yumerefendi, A.1
Mickle, B.2
Cox, L.3
-
62
-
-
85084161756
-
Using CQUAL for static analysis of authorization hook placement
-
Aug
-
X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for static analysis of authorization hook placement. In USENIX Security, Aug 2002.
-
(2002)
USENIX Security
-
-
Zhang, X.1
Edwards, A.2
Jaeger, T.3
|