메뉴 건너뛰기




Volumn , Issue , 2010, Pages 158-163

Observation mechanism and cost model for tightly coupled asymmetric concurrency

Author keywords

Asymmetric concurrency; Computational model; Intrusion detection; Memory observation

Indexed keywords

ASYMMETRIC CONCURRENCY; COMPUTATIONAL MODEL; CONCURRENT PROCESSING; COST MODELS; CURRENT COMPUTING; DETECTION MECHANISM; MALICIOUS CODES; MEMORY STATE; RESOURCE CONTENTION; SECOND ORDERS; SENSOR DATA; TIGHTLY-COUPLED;

EID: 77953734121     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICONS.2010.34     Document Type: Conference Paper
Times cited : (3)

References (19)
  • 2
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • ser. Lecture Notes in Computer Science, D. Zamboni, Ed., Heidelberg, Germany: Springer-Verlag, Jul.
    • L. Cavallaro, P. Saxena, and R. Sekar, "On the Limits of Information Flow Techniques for Malware Analysis and Containment," in Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2008), ser. Lecture Notes in Computer Science, D. Zamboni, Ed., vol. 5137. Heidelberg, Germany: Springer-Verlag, Jul. 2008, pp. 143-163.
    • (2008) Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2008) , vol.5137 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 6
    • 85084162914 scopus 로고    scopus 로고
    • Copilot - A coprocessor-based kernel runtime integrity monitor
    • M. Blaze, Ed. San Diego, CA, USA: USENIX Press, Aug.
    • N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor," in Proceedings of the 13th USENIX Security Symposium, M. Blaze, Ed. San Diego, CA, USA: USENIX Press, Aug. 2004, pp. 179-194.
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 179-194
    • Petroni Jr., N.L.1    Fraser, T.2    Molina, J.3    Arbaugh, W.A.4
  • 7
    • 85134783150 scopus 로고    scopus 로고
    • Using observations of invariant behavior to detect malicious agency in distributed environments
    • ser. Lecture Notes in Informatics, vol. 140. Mannheim, Germany: GI, Sep.
    • T. R. McEvoy and S. D. Wolthusen, "Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Environments," in Proceedings of IT Incident Management and IT Forensics (IMF 2008), ser. Lecture Notes in Informatics, vol. 140. Mannheim, Germany: GI, Sep. 2008, pp. 55-72.
    • (2008) Proceedings of it Incident Management and it Forensics (IMF 2008) , pp. 55-72
    • McEvoy, T.R.1    Wolthusen, S.D.2
  • 8
    • 33846240066 scopus 로고    scopus 로고
    • CuPIDS: An exploration of highly focused, co-processor-based information system protection
    • Apr.
    • P. D. Williams and E. H. Spafford, "CuPIDS: An Exploration of Highly Focused, Co-Processor-based Information System Protection," Computer Networks, vol. 51, no. 5, pp. 1284- 1298, Apr. 2007.
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1284-1298
    • Williams, P.D.1    Spafford, E.H.2
  • 10
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Vancouver, BC, Canada
    • N. L. Petroni, T. Fraser, A. Walters, and W. A. Arbaugh, "An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data," in Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, 2006, pp. 289-304.
    • (2006) Proceedings of the 15th USENIX Security Symposium , pp. 289-304
    • Petroni, N.L.1    Fraser, T.2    Walters, A.3    Arbaugh, W.A.4
  • 11
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control-flow attacks
    • S. D. C. di Vimercati and P. Syverson, Eds. New York, NY, USA: ACM Press, Oct.
    • N. L. Petroni Jr. and M. Hicks, "Automated Detection of Persistent Kernel Control-Flow Attacks," in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), S. D. C. di Vimercati and P. Syverson, Eds. New York, NY, USA: ACM Press, Oct. 2007, pp. 103-115.
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) , pp. 103-115
    • Petroni Jr., N.L.1    Hicks, M.2
  • 12
    • 56549094242 scopus 로고    scopus 로고
    • A multi-sensor model to improve automated attack detection
    • ser. Lecture Notes in Computer Science, R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Heidelberg, Germany: Springer-Verlag, Sep.
    • M. Almgren, U. Lindqvist, and E. Jonsson, "A Multi-Sensor Model to Improve Automated Attack Detection," in Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), ser. Lecture Notes in Computer Science, R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., vol. 5230. Heidelberg, Germany: Springer-Verlag, Sep. 2008, pp. 291-310.
    • (2008) Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008) , vol.5230 , pp. 291-310
    • Almgren, M.1    Lindqvist, U.2    Jonsson, E.3
  • 14
    • 79955715200 scopus 로고
    • The working set model for program behavior
    • Massachusetts Institute of Technology, Cambridge, Massachusetts: ACM
    • P. J. Denning, "The Working Set Model for Program Behavior," in Communications of the ACM, vol. 11. Massachusetts Institute of Technology, Cambridge, Massachusetts: ACM, 1968, pp. 323-333.
    • (1968) Communications of the ACM , vol.11 , pp. 323-333
    • Denning, P.J.1
  • 15
    • 0015316498 scopus 로고
    • Properties of the working- Set model
    • Princeton University, Department of Electrical Engineering: ACM
    • P. J. Denning and S. C. Schwartz, "Properties of the Working- Set Model," in Communications of the ACM, vol. 15. Princeton University, Department of Electrical Engineering: ACM, 1972, pp. 191-198.
    • (1972) Communications of the ACM , vol.15 , pp. 191-198
    • Denning, P.J.1    Schwartz, S.C.2
  • 16
    • 15744393453 scopus 로고    scopus 로고
    • On paging with locality of reference
    • S. Albers, L. M. Favrholdt, and O. Giel, "On paging with locality of reference," J. Comput. Syst. Sci., vol. 70, no. 2, pp. 145-175, 2005.
    • (2005) J. Comput. Syst. Sci. , vol.70 , Issue.2 , pp. 145-175
    • Albers, S.1    Favrholdt, L.M.2    Giel, O.3
  • 17
    • 0000094273 scopus 로고    scopus 로고
    • A unified analysis of paging and caching
    • E. Torng, "A unified analysis of paging and caching," Algorithmica, vol. 20, pp. 194-203, 1998.
    • (1998) Algorithmica , vol.20 , pp. 194-203
    • Torng, E.1
  • 19
    • 67650552214 scopus 로고    scopus 로고
    • (May), nVIDIA. [Online]. Available
    • nVIDIA. (2009, May) Nvidia cuda programming guide. nVIDIA. [Online]. Available: http://developer.download.nvidia.com/compute/cuda/221/toolkit/docs/ NVIDIA-CUDA-Programming-Guide2.2.1.pdf.
    • (2009) Nvidia Cuda Programming Guide


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.