-
2
-
-
33646346832
-
The microarchitecture of the Intel Pentium 4 processor on 90nm technology
-
February
-
D. Boggs, A. Baktha, J. Hawkins, D.T. Marr, J. A. Miller, P. Roussel, Singhal R, B. Toll, and K. S. Venkatraman. The microarchitecture of the Intel Pentium 4 processor on 90nm technology. Intel Technology Journal, 8(1), February 2004.
-
(2004)
Intel Technology Journal
, vol.8
, Issue.1
-
-
Boggs, D.1
Baktha, A.2
Hawkins, J.3
Marr, D.T.4
Miller, J.A.5
Roussel, P.6
Singhal, R.7
Toll, B.8
Venkatraman, K.S.9
-
3
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of the USENIX Security Symposium, August 2004.
-
Proceedings of the USENIX Security Symposium, August 2004
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
4
-
-
84882752836
-
Mesure locale des temps d'execution: Application au controle d'integrite et au fingerprinting
-
G. Delalleau. Mesure locale des temps d'execution: application au controle d'integrite et au fingerprinting. In Proceedings of SSTIC, 2004.
-
Proceedings of SSTIC, 2004
-
-
Delalleau, G.1
-
9
-
-
84874416124
-
-
Available at: October
-
Intel Corporation. Intel virtualization technology. Available at: http://www.intel.com/technology/computing/vptech/, October 2005.
-
(2005)
Intel Virtualization Technology
-
-
-
11
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy, May 2006.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 2006
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
17
-
-
42649119611
-
Execution path analysis: Finding kernel rootkits
-
July
-
J. Rutkowski. Execution path analysis: finding kernel rootkits. Phrack, 11(59), July 2002.
-
(2002)
Phrack
, vol.11
, Issue.59
-
-
Rutkowski, J.1
-
18
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of SOSP, 2005.
-
Proceedings of SOSP, 2005
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
20
-
-
77952263072
-
VMWare
-
Technical Report NP-ENG-Q305-127, VMWare, Inc., July
-
VMWare. Timekeeping in VMWare virtual machines. Technical Report NP-ENG-Q305-127, VMWare, Inc., July 2005.
-
(2005)
Timekeeping in VMWare Virtual Machines
-
-
-
21
-
-
84885575254
-
Scalability, fidelity and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage. Scalability, fidelity and containment in the potemkin virtual honeyfarm. In Proceedings of SOSP, 2005.
-
Proceedings of SOSP, 2005
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
|