-
2
-
-
59249106693
-
Detecting targeted attacks using shadow honey-pots
-
August
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honey-pots. In Proceedings of the 2005 USENIX Security Symposium, August 2005.
-
(2005)
Proceedings of the 2005 USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
4
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
Seattle, WA, October
-
Miguel Castro, Manuel Costa, and Tim Harris. Securing software by enforcing data-flow integrity. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pages 147-160, Seattle, WA, October 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 147-160
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
5
-
-
0037567883
-
Automatic I/O hint generation through, speculative execution
-
New Orleans, LA, February
-
Fay Chang and Garth Gibson. Automatic I/O hint generation through, speculative execution. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, pages 1-14, New Orleans, LA, February 1999.
-
(1999)
Proceedings of the 3rd Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Chang, F.1
Gibson, G.2
-
6
-
-
34547192631
-
Log-Based Architectures for General-Purpose Monitoring of Deployed Code. 2006
-
October
-
Shimin Chen, Babak Falsafi, Phillip B. Gibbons, Michael Kozuch, Todd C. Mowry, Radu Teodorescu, Anastassia Ailamaki, Limor Fix, Gregory R. Ganger, Bin Lin, and Steven W. Schlosser. Log-Based Architectures for General-Purpose Monitoring of Deployed Code. 2006 Workshop on Architectural and System Support for Improving Software Dependability, October 2006.
-
(2006)
Workshop on Architectural and System Support for Improving Software Dependability
-
-
Chen, S.1
Falsafi, B.2
Gibbons, P.B.3
Kozuch, M.4
Mowry, T.C.5
Teodorescu, R.6
Ailamaki, A.7
Fix, L.8
Ganger, G.R.9
Lin, B.10
Schlosser, S.W.11
-
7
-
-
84889030419
-
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation
-
August
-
Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. In Proceedings of the 2005 USENIX Security Symposium, pages 331-346, August 2005.
-
(2005)
Proceedings of the 2005 USENIX Security Symposium
, pp. 331-346
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
8
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, United Kingdom, October
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: end-to-end containment of internet worms. In Proceedings of the 20th ACM Symposium, on Operating Systems Principles, pages 133-147, Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium, on Operating Systems Principles
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtualmachine logging and replay
-
Boston, MA, December
-
George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, and Peter M. Chen. ReVirt: Enabling intrusion analysis through virtualmachine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pages 211-224, Boston, MA, December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
10
-
-
33845462269
-
Operating system I/O speculation: How two invocations are faster than one
-
San Antonio, TX, June
-
Keir Fraser and Fay Chang. Operating system I/O speculation: How two invocations are faster than one. In Proceedings of the 2003 USENIX Technical Conference, pages 325-338, San Antonio, TX, June 2003.
-
(2003)
Proceedings of the 2003 USENIX Technical Conference
, pp. 325-338
-
-
Fraser, K.1
Chang, F.2
-
11
-
-
34748845128
-
Practical Taint-based Protection using Demand Emulation
-
Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, and Steven Hand. Practical Taint-based Protection using Demand Emulation. In Proceedings of EuwSys 2006, 2006.
-
(2006)
Proceedings of EuwSys 2006
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
12
-
-
0003653892
-
PostMark: A new file system benchmark
-
Technical Report TR3022, Network Appliance
-
Jeffrey Katcher. PostMark: A new file system benchmark. Technical Report TR3022, Network Appliance, 1997.
-
(1997)
-
-
Katcher, J.1
-
15
-
-
84887095037
-
Pulse: A. dynamic deadlock detection mechanism, using speculative execution
-
April
-
Tong Li, Carla S. Ellis, Alvin R. Lebeck, and Daniel J. Sorin. Pulse: A. dynamic deadlock detection mechanism, using speculative execution. In Proceedings of the 2005 USENIX Technical Conference, 31-44, April 2005.
-
(2005)
Proceedings of the 2005 USENIX Technical Conference
, pp. 31-44
-
-
Li, T.1
Ellis, C.S.2
Lebeck, A.R.3
Sorin, D.J.4
-
16
-
-
31944440969
-
Pin: Building customized program analysis tools with, dynamic instrumentation
-
Chicago, IL, June
-
Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Paul, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. Pin: Building customized program analysis tools with, dynamic instrumentation. In Programming Language Design and Implementation, pages 190-200, Chicago, IL, June 2005.
-
(2005)
Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Paul, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Janapa Reddi, V.8
Hazelwood, K.9
-
17
-
-
85084164499
-
Avfs: An on-access anti-virus file system
-
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, , and Erez Zadok. Avfs: An on-access anti-virus file system. In Proceedings of the 13th USENIX Security Symposium, pages 73-88, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 73-88
-
-
Miretskiy, Y.1
Das, A.2
Wright, C.P.3
Zadok, E.4
-
20
-
-
84885629677
-
Speculative execution in a distributed file system
-
Brighton, United Kingdom, October
-
Edmund B. Nightingale, Peter M. Chen, and Jason Flinn. Speculative execution in a distributed file system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 191-205, Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 191-205
-
-
Nightingale, E.B.1
Chen, P.M.2
Flinn, J.3
-
21
-
-
41149089633
-
Rethink the sync
-
Seattle, WA, October
-
Edmund B. Nightingale, Kaushik Veeraraghavan, Peter M. Chen, and Jason Flinn. Rethink the sync. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pages 1-14, Seattle, WA, October 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Nightingale, E.B.1
Veeraraghavan, K.2
Chen, P.M.3
Flinn, J.4
-
25
-
-
84878346861
-
Improving host security with system call policies
-
Washington, D.C, August
-
Niels Provos. Improving host security with system call policies. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Provos, N.1
-
26
-
-
84885578759
-
Rx: Treating bugs as allergies - a safe method to survive software failures
-
Brighton, United Kingdom, October
-
Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou. Rx: Treating bugs as allergies - a safe method to survive software failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 235-248, Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
27
-
-
40349087553
-
Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system, for detecting general security attacks
-
Orlando, FL
-
Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system, for detecting general security attacks. In The 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '06), Orlando, FL, 2006.
-
(2006)
The 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '06)
-
-
Qin, F.1
Wang, C.2
Li, Z.3
-
30
-
-
85027866215
-
Dynamic native optimization of interpreters
-
G. T. Sullivan, D. L. Bruening, I. Baron, T. Garnett, and S. Amarasinghe. Dynamic native optimization of interpreters. In Proceedings of the Workshop on Interpreters, Virtual Machines and Emulators, 2003.
-
(2003)
Proceedings of the Workshop on Interpreters, Virtual Machines and Emulators
-
-
Sullivan, G.T.1
Bruening, D.L.2
Baron, I.3
Garnett, T.4
Amarasinghe, S.5
-
34
-
-
0038684791
-
-
Min Xu, Rastislav Bodik, and Mark D. Hill. A. Flight Data Recorder for Enabling Full-system Multiprocessor Deterministic Replay. In Proceedings of the 2003 International Symposium on Computer Architecture, June 2003.
-
Min Xu, Rastislav Bodik, and Mark D. Hill. A. Flight Data Recorder for Enabling Full-system Multiprocessor Deterministic Replay. In Proceedings of the 2003 International Symposium on Computer Architecture, June 2003.
-
-
-
-
35
-
-
4644293534
-
-
Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 2004 International Symposium on Computer Architecture, June 2004.
-
Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 2004 International Symposium on Computer Architecture, June 2004.
-
-
-
|