-
1
-
-
48649087530
-
Limits of static analysis for malware detection
-
Miami Beach, FL, USA: IEEE Press, Dec.
-
A. Moser, C. Kruegel, and E. Kirda, "Limits of Static Analysis for Malware Detection," in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007). Miami Beach, FL, USA: IEEE Press, Dec. 2007, pp. 421-430.
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007)
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
2
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
ser. Lecture Notes in Computer Science, D. Zamboni, Ed., Heidelberg, Germany: Springer-Verlag, Jul.
-
L. Cavallaro, P. Saxena, and R. Sekar, "On the Limits of Information Flow Techniques for Malware Analysis and Containment," in Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2008), ser. Lecture Notes in Computer Science, D. Zamboni, Ed., vol. 5137. Heidelberg, Germany: Springer-Verlag, Jul. 2008, pp. 143-163.
-
(2008)
Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2008)
, vol.5137
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
3
-
-
0036957148
-
Enhancing software reliability with speculative threads
-
K. Gharachorloo, Ed. New York, NY, USA: ACM Press, Oct.
-
J. Oplinger and M. S. Lam, "Enhancing Software Reliability with Speculative Threads," in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII), K. Gharachorloo, Ed. New York, NY, USA: ACM Press, Oct. 2002, pp. 184-196.
-
(2002)
Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII)
, pp. 184-196
-
-
Oplinger, J.1
Lam, M.S.2
-
4
-
-
77957797161
-
Parallelizing security checks on commodity hardware
-
S. Eggers and J. Larus, Eds. New York, NY, USA: ACM Press, Mar.
-
E. B. Nightingale, D. Peek, P. M. Chen, and J. Flinn, "Parallelizing Security Checks on Commodity Hardware," in Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII), S. Eggers and J. Larus, Eds. New York, NY, USA: ACM Press, Mar. 2008, pp. 308-318.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII)
, pp. 308-318
-
-
Nightingale, E.B.1
Peek, D.2
Chen, P.M.3
Flinn, J.4
-
5
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
G. Muller and E. Jul, Eds. New York, NY, USA: ACM Press, Jul.
-
X. Zhang, L. van Doorn, T. Jaeger, R. Perez, and R. Sailer, "Secure Coprocessor-Based Intrusion Detection," in Proceedings of the 10th ACM SIGOPS European Workshop, G. Muller and E. Jul, Eds. New York, NY, USA: ACM Press, Jul. 2002, pp. 239-242.
-
(2002)
Proceedings of the 10th ACM SIGOPS European Workshop
, pp. 239-242
-
-
Zhang, X.1
Doorn, L.V.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
-
6
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
M. Blaze, Ed. San Diego, CA, USA: USENIX Press, Aug.
-
N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor," in Proceedings of the 13th USENIX Security Symposium, M. Blaze, Ed. San Diego, CA, USA: USENIX Press, Aug. 2004, pp. 179-194.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
7
-
-
85134783150
-
Using observations of invariant behavior to detect malicious agency in distributed environments
-
ser. Lecture Notes in Informatics, vol. 140. Mannheim, Germany: GI, Sep.
-
T. R. McEvoy and S. D. Wolthusen, "Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Environments," in Proceedings of IT Incident Management and IT Forensics (IMF 2008), ser. Lecture Notes in Informatics, vol. 140. Mannheim, Germany: GI, Sep. 2008, pp. 55-72.
-
(2008)
Proceedings of it Incident Management and it Forensics (IMF 2008)
, pp. 55-72
-
-
McEvoy, T.R.1
Wolthusen, S.D.2
-
8
-
-
33846240066
-
CuPIDS: An exploration of highly focused, co-processor-based information system protection
-
Apr.
-
P. D. Williams and E. H. Spafford, "CuPIDS: An Exploration of Highly Focused, Co-Processor-based Information System Protection," Computer Networks, vol. 51, no. 5, pp. 1284- 1298, Apr. 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1284-1298
-
-
Williams, P.D.1
Spafford, E.H.2
-
10
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, BC, Canada
-
N. L. Petroni, T. Fraser, A. Walters, and W. A. Arbaugh, "An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data," in Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, 2006, pp. 289-304.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 289-304
-
-
Petroni, N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
11
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
S. D. C. di Vimercati and P. Syverson, Eds. New York, NY, USA: ACM Press, Oct.
-
N. L. Petroni Jr. and M. Hicks, "Automated Detection of Persistent Kernel Control-Flow Attacks," in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), S. D. C. di Vimercati and P. Syverson, Eds. New York, NY, USA: ACM Press, Oct. 2007, pp. 103-115.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 103-115
-
-
Petroni Jr., N.L.1
Hicks, M.2
-
12
-
-
56549094242
-
A multi-sensor model to improve automated attack detection
-
ser. Lecture Notes in Computer Science, R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Heidelberg, Germany: Springer-Verlag, Sep.
-
M. Almgren, U. Lindqvist, and E. Jonsson, "A Multi-Sensor Model to Improve Automated Attack Detection," in Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), ser. Lecture Notes in Computer Science, R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., vol. 5230. Heidelberg, Germany: Springer-Verlag, Sep. 2008, pp. 291-310.
-
(2008)
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008)
, vol.5230
, pp. 291-310
-
-
Almgren, M.1
Lindqvist, U.2
Jonsson, E.3
-
14
-
-
79955715200
-
The working set model for program behavior
-
Massachusetts Institute of Technology, Cambridge, Massachusetts: ACM
-
P. J. Denning, "The Working Set Model for Program Behavior," in Communications of the ACM, vol. 11. Massachusetts Institute of Technology, Cambridge, Massachusetts: ACM, 1968, pp. 323-333.
-
(1968)
Communications of the ACM
, vol.11
, pp. 323-333
-
-
Denning, P.J.1
-
15
-
-
0015316498
-
Properties of the working- Set model
-
Princeton University, Department of Electrical Engineering: ACM
-
P. J. Denning and S. C. Schwartz, "Properties of the Working- Set Model," in Communications of the ACM, vol. 15. Princeton University, Department of Electrical Engineering: ACM, 1972, pp. 191-198.
-
(1972)
Communications of the ACM
, vol.15
, pp. 191-198
-
-
Denning, P.J.1
Schwartz, S.C.2
-
16
-
-
15744393453
-
On paging with locality of reference
-
S. Albers, L. M. Favrholdt, and O. Giel, "On paging with locality of reference," J. Comput. Syst. Sci., vol. 70, no. 2, pp. 145-175, 2005.
-
(2005)
J. Comput. Syst. Sci.
, vol.70
, Issue.2
, pp. 145-175
-
-
Albers, S.1
Favrholdt, L.M.2
Giel, O.3
-
17
-
-
0000094273
-
A unified analysis of paging and caching
-
E. Torng, "A unified analysis of paging and caching," Algorithmica, vol. 20, pp. 194-203, 1998.
-
(1998)
Algorithmica
, vol.20
, pp. 194-203
-
-
Torng, E.1
-
18
-
-
0003971832
-
-
Ph.D. dissertation, Stanford, CA, USA
-
A. Agarwal, "Analysis of cache performance for operating systems and multiprogramming," Ph.D. dissertation, Stanford, CA, USA, 1987.
-
(1987)
Analysis of Cache Performance for Operating Systems and Multiprogramming
-
-
Agarwal, A.1
-
19
-
-
67650552214
-
-
(May), nVIDIA. [Online]. Available
-
nVIDIA. (2009, May) Nvidia cuda programming guide. nVIDIA. [Online]. Available: http://developer.download.nvidia.com/compute/cuda/221/toolkit/docs/ NVIDIA-CUDA-Programming-Guide2.2.1.pdf.
-
(2009)
Nvidia Cuda Programming Guide
-
-
|