-
1
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
New York, NY, USA: ACM
-
X. Zhang, L. van Doorn, T. Jaeger, R. Perez, and R. Sailer, "Secure Coprocessor-based Intrusion Detection," in EW10: Proceedings of the 10th workshop on ACM SIGOPS European workshop. New York, NY, USA: ACM, 2002, pp. 239-242.
-
(2002)
EW10: Proceedings of the 10th Workshop on ACM SIGOPS European Workshop
, pp. 239-242
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
-
2
-
-
48649087530
-
Limits of static analysis for malware detection
-
ACSAC 2007. Twenty-Third Annual
-
A. Moser, C. Kruegel, and E. Kirda, "Limits of Static Analysis for Malware Detection," in Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, 2007, pp. 421-430.
-
(2007)
Computer Security Applications Conference, 2007
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
3
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
Berlin, Heidelberg: Springer-Verlag
-
L. Cavallaro, P. Saxena, and R. Sekar, "On the Limits of Information Flow Techniques for Malware Analysis and Containment," in DIMVA '08: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 143-163.
-
(2008)
DIMVA '08: Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
5
-
-
85134783150
-
Using observations of invariant behavior to detect malicious agency in distributed environments
-
Volume 140 of Lecture Notes in Informatics, Mannheim, Germany
-
-, "Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Environments," in Proceedings of IT Incident Management and IT Forensics (IMF 2008). Volume 140 of Lecture Notes in Informatics, Mannheim, Germany, 2008, pp. 55-72.
-
(2008)
Proceedings of IT Incident Management and IT Forensics (IMF 2008)
, pp. 55-72
-
-
-
6
-
-
77956071702
-
-
Advanced Micro Devices [Online; accessed 01/18/2010]
-
Advanced Micro Devices, "ATI Stream Computing - Technical Overview," http://developer.amd.com/gpuassets/StreamComputingOverview.pdf, 2009, [Online; accessed 01/18/2010].
-
(2009)
ATI Stream Computing - Technical Overview
-
-
-
8
-
-
0022882379
-
Data parallel algorithms
-
Jr. G.L.S.
-
W. D. Hillis and G. L. S. Jr., "Data parallel algorithms," Commun. ACM, vol. 29, no. 12, pp. 1170-1183, 1986.
-
(1986)
Commun. ACM
, vol.29
, Issue.12
, pp. 1170-1183
-
-
Hillis, W.D.1
-
10
-
-
57349092386
-
Cuba: An architecture for efficient cpu/co-processor data communication
-
New York, NY, USA: ACM
-
I. Gelado, J. H. Kelm, S. Ryoo, S. S. Lumetta, N. Navarro, and W. mei W. Hwu, "Cuba: An architecture for efficient cpu/co-processor data communication," in ICS '08: Proceedings of the 22nd annual international conference on Supercomputing. New York, NY, USA: ACM, 2008, pp. 299-308.
-
(2008)
ICS '08: Proceedings of the 22nd Annual International Conference on Supercomputing
, pp. 299-308
-
-
Gelado, I.1
Kelm, J.H.2
Ryoo, S.3
Lumetta, S.S.4
Navarro, N.5
Mei, W.6
Hwu, W.7
-
11
-
-
77956070208
-
-
[Online; accessed 04/02/2010]
-
Thomas Bradley, "Advanced CUDA Optimization - 3. Execution," http://www.gris.tu-darmstadt.de/cuda-workshop/tutorial/AdvancedCUDA03.pdf, 2010, [Online; accessed 04/02/2010].
-
(2010)
Advanced CUDA Optimization - 3. Execution
-
-
Bradley, T.1
-
12
-
-
77956085251
-
-
NVIDIA Corporation NVIDIA CUDA SDK [Online; accessed 12/01/2009]
-
NVIDIA Corporation, "CUDA 2.2 Pinned Memory APIs," NVIDIA CUDA SDK, 2009, [Online; accessed 12/01/2009].
-
(2009)
CUDA 2.2 Pinned Memory APIs
-
-
-
13
-
-
77956065279
-
-
[Online; accessed 01/18/2010]
-
-, "NVIDIA CUDA SDK," http://www.nvidia.com/object/cudasdks. html, 2010, [Online; accessed 01/18/2010].
-
(2010)
-
-
-
14
-
-
79957446666
-
-
Advanced Micro Devices [Online; accessed 01/18/2010]
-
Advanced Micro Devices, "ATI Stream SDK," http://developer.amd. com/gpu/ATIStreamSDK/Pages/default.aspx, 2010, [Online; accessed 01/18/2010].
-
(2010)
ATI Stream SDK
-
-
-
15
-
-
77956086692
-
-
[Online; accessed 01/18/2010]
-
Khronos Group, "OpenCL," http://www.khronos.org/opencl/, 2010, [Online; accessed 01/18/2010].
-
(2010)
OpenCL
-
-
-
16
-
-
77956074363
-
-
Advanced Micro Devices [Online; accessed 01/18/2010]
-
Advanced Micro Devices, "Open GPU Documentation," http://developer.amd.com/documentation/guides/Pages/default.aspx, 2010, [Online; accessed 01/18/2010].
-
(2010)
Open GPU Documentation
-
-
-
18
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
Berkeley, CA, USA: USENIX Association
-
N. L. Petroni-Jr., T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor," in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 13-13.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 13-13
-
-
Petroni-Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
19
-
-
74049145334
-
A microdriver architecture for error correcting codes inside the linux kernel
-
New York, NY, USA: ACM
-
A. Brinkmann and D. Eschweiler, "A microdriver architecture for error correcting codes inside the Linux kernel," in SC '09: Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis. New York, NY, USA: ACM, 2009, pp. 1-10.
-
(2009)
SC '09: Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis
, pp. 1-10
-
-
Brinkmann, A.1
Eschweiler, D.2
-
20
-
-
77955858732
-
-
[Online; accessed 01/18/2010]
-
NVIDIA Corporation, "Fermi - NVIDIA's Next Generation CUDA Compute Architecture," http://www.nvidia.com/content/PDF/fermiwhitepapers/ NVIDIAFermiComputeArchitectureWhitepaper.pdf, 2009, [Online; accessed 01/18/2010].
-
(2009)
Fermi - NVIDIA's Next Generation CUDA Compute Architecture
-
-
-
21
-
-
33845435188
-
Mondrix: Memory isolation for linux using mondriaan memory protection
-
E. Witchel, J. Rhee, and K. Asanović, "Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection," SIGOPS Oper. Syst. Rev., vol. 39, no. 5, pp. 31-44, 2005.
-
(2005)
SIGOPS Oper. Syst. Rev.
, vol.39
, Issue.5
, pp. 31-44
-
-
Witchel, E.1
Rhee, J.2
Asanović, K.3
-
22
-
-
77950823828
-
Protecting commodity operating system kernels from vulnerable device drivers
-
Honolulu, Hawaii, USA: IEEE Computer Society Press, Los Alamitos, California, USA, December
-
S. Butt, V. Ganapathy, M. M. Swift, and C.-C. Chang, "Protecting Commodity Operating System Kernels from Vulnerable Device Drivers," in ACSAC'09: Proceedings of the 25th Annual Computer Security Applications Conference. Honolulu, Hawaii, USA: IEEE Computer Society Press, Los Alamitos, California, USA, December 2009, pp. 301-310.
-
(2009)
ACSAC'09: Proceedings of the 25th Annual Computer Security Applications Conference
, pp. 301-310
-
-
Butt, S.1
Ganapathy, V.2
Swift, M.M.3
Chang, C.-C.4
-
23
-
-
74049130873
-
Hardware-enforced fine-grained isolation of untrusted code
-
New York, NY, USA: ACM
-
E. Leontie, G. Bloom, B. Narahari, R. Simha, and J. Zambreno, "Hardware-enforced Fine-grained Isolation of Untrusted Code," in Secu-Code '09: Proceedings of the first ACM workshop on Secure execution of untrusted code. New York, NY, USA: ACM, 2009, pp. 11-18.
-
(2009)
Secu-Code '09: Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code
, pp. 11-18
-
-
Leontie, E.1
Bloom, G.2
Narahari, B.3
Simha, R.4
Zambreno, J.5
-
24
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
New York, NY, USA: ACM
-
M. M. Swift, B. N. Bershad, and H. M. Levy, "Improving the Reliability of Commodity Operating Systems," in SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles. New York, NY, USA: ACM, 2003, pp. 207-222.
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
27
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
B. D. Payne and W. Lee, "Secure and Flexible Monitoring of Virtual Machines," in ACSAC, 2007, pp. 385-397.
-
(2007)
ACSAC
, pp. 385-397
-
-
Payne, B.D.1
Lee, W.2
-
28
-
-
77950834189
-
TrustGraph: Trusted graphics subsystem for high assurance systems
-
IEEE Computer Society
-
H. Okhravi and D. M. Nicol, "TrustGraph: Trusted Graphics Subsystem for High Assurance Systems." in ACSAC. IEEE Computer Society, 2009, pp. 254-265.
-
(2009)
ACSAC
, pp. 254-265
-
-
Okhravi, H.1
Nicol, D.M.2
|