-
1
-
-
74049137368
-
Yet another microarchitectural attack: Exploiting I-cache
-
Nov.
-
O. Aciiçmez. Yet another microarchitectural attack: Exploiting I-cache. In CCAW, Nov. 2007.
-
(2007)
CCAW
-
-
Aciiçmez, O.1
-
2
-
-
47949133545
-
Predicting secret keys via branch prediction
-
Feb.
-
O. Aciiçmez, Çetin Kaya Koç, and J.-P. Seifert. Predicting secret keys via branch prediction. In CT-RSA, Feb. 2007.
-
(2007)
CT-RSA
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
4
-
-
78650085773
-
Determinator: OS support for efficient deterministic parallelism
-
Oct. To appear
-
A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Determinator: OS support for efficient deterministic parallelism. In 9th OSDI, Oct. 2010. To appear. http://arxiv.org/abs/1005.3450.
-
(2010)
9th OSDI
-
-
Aviram, A.1
Weng, S.-C.2
Hu, S.3
Ford, B.4
-
5
-
-
77952244542
-
CoreDet: A compiler and runtime system for deterministic multithreaded execution
-
Mar.
-
T. Bergan, O. Anderson, J. Devietti, L. Ceze, and D. Grossman. CoreDet: A compiler and runtime system for deterministic multithreaded execution. In 15th ASPLOS, Mar. 2010.
-
(2010)
15th ASPLOS
-
-
Bergan, T.1
Anderson, O.2
Devietti, J.3
Ceze, L.4
Grossman, D.5
-
6
-
-
72249116705
-
Grace: Safe multithreaded programming for C/C++
-
Oct.
-
E. D. Berger, T. Yang, T. Liu, and G. Novark. Grace: Safe multithreaded programming for C/C++. In OOPSLA, Oct. 2009.
-
(2009)
OOPSLA
-
-
Berger, E.D.1
Yang, T.2
Liu, T.3
Novark, G.4
-
7
-
-
0000954569
-
Extensibility, safety and performance in the SPIN operating system
-
B. N. Bershad et al. Extensibility, safety and performance in the SPIN operating system. In 15th SOSP, 1995.
-
(1995)
15th SOSP
-
-
Bershad, B.N.1
-
8
-
-
84924318954
-
Parallel programming must be deterministic by default
-
Mar.
-
R. L. Bocchino Jr. et al. Parallel programming must be deterministic by default. In 1st HotPar. Mar. 2009.
-
(2009)
1st HotPar
-
-
Bocchino Jr., R.L.1
-
11
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
May
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: a reality today, a challenge tomorrow. In IEEE Symposium on Security and Privacy, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
13
-
-
11844249640
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec.
-
G. W. Dunlap et al. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In 5th OSDI, Dec. 2002.
-
(2002)
5th OSDI
-
-
Dunlap, G.W.1
-
14
-
-
77952406152
-
Execution replay for multiprocessor virtual machines
-
Mar.
-
G. W. Dunlap et al. Execution replay for multiprocessor virtual machines. In VEE, Mar. 2008.
-
(2008)
VEE
-
-
Dunlap, G.W.1
-
15
-
-
49749093016
-
Programming shared memory multiprocessors with deterministic message-passing concurrency: Compiling SHIM to pthreads
-
Mar.
-
S. A. Edwards, N. Vasudevan, and O. Tardieu. Programming shared memory multiprocessors with deterministic message-passing concurrency: Compiling SHIM to Pthreads. In DATE, Mar. 2008.
-
(2008)
DATE
-
-
Edwards, S.A.1
Vasudevan, N.2
Tardieu, O.3
-
16
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
Oct.
-
P. Efstathopoulos et al. Labels and event processes in the Asbestos operating system. In 20th SOSP, Oct. 2005.
-
(2005)
20th SOSP
-
-
Efstathopoulos, P.1
-
17
-
-
85086058271
-
Microkernels meet recursive virtual machines
-
B. Ford, M. Hibler, J. Lepreau, P. Tullmann, G. Back, and S. Clawson. Microkernels meet recursive virtual machines. In 2nd OSDI, pages 137-151, 1996.
-
(1996)
2nd OSDI
, pp. 137-151
-
-
Ford, B.1
Hibler, M.2
Lepreau, J.3
Tullmann, P.4
Back, G.5
Clawson, S.6
-
18
-
-
0000087207
-
The semantics of a simple language for parallel programming
-
G. Kahn. The semantics of a simple language for parallel programming. In Information Processing, pages 471-475. 1974.
-
(1974)
Information Processing
, pp. 471-475
-
-
Kahn, G.1
-
19
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
Aug.
-
R. A. Kemmerer. Shared resource matrix methodology: An approach to identifying storage and timing channels. TOCS, 1(3):256-277, Aug. 1983.
-
(1983)
TOCS
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
20
-
-
78650086253
-
Deconstructing new cache designs for thwarting software cache-based side channel attacks
-
Oct.
-
J. Kong, O. Aciiçmez, J.-P. Seifert, and H. Zhou. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In 1st CSAW, Oct. 2008.
-
(2008)
1st CSAW
-
-
Kong, J.1
Aciiçmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
22
-
-
33646892173
-
The problem with threads
-
May
-
E. Lee. The problem with threads. Computer, 39(5):33-42, May 2006.
-
(2006)
Computer
, vol.39
, Issue.5
, pp. 33-42
-
-
Lee, E.1
-
24
-
-
77957773135
-
Learning from mistakes - A comprehensive study on real world concurrency bug characteristics
-
Mar.
-
S. Lu, S. Park, E. Seo, and Y. Zhou. Learning from mistakes - a comprehensive study on real world concurrency bug characteristics. In 13th ASPLOS, pages 329-339, Mar. 2008.
-
(2008)
13th ASPLOS
, pp. 329-339
-
-
Lu, S.1
Park, S.2
Seo, E.3
Zhou, Y.4
-
25
-
-
0019563173
-
Detection of mutual inconsistency in distributed systems
-
May
-
D. S. Parker, Jr. et al. Detection of mutual inconsistency in distributed systems. IEEE Transactions on Software Engineering, SE-9(3), May 1983.
-
(1983)
IEEE Transactions on Software Engineering
, vol.SE-9
, Issue.3
-
-
Parker Jr., D.S.1
-
26
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
May
-
S. Pearson. Taking account of privacy when designing cloud computing services. In ICSE-Cloud '09, pages 44-52, May 2009.
-
(2009)
ICSE-Cloud '09
, pp. 44-52
-
-
Pearson, S.1
-
27
-
-
33646805500
-
Cache missing for fun and profit
-
May
-
C. Percival. Cache missing for fun and profit. In BSDCan, May 2005.
-
(2005)
BSDCan
-
-
Percival, C.1
-
28
-
-
34047141132
-
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
-
Mar.
-
N. R. Potlapally et al. Satisfiability-based framework for enabling side-channel attacks on cryptographic software. In DATE, Mar. 2006.
-
(2006)
DATE
-
-
Potlapally, N.R.1
-
29
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In 16th CCS, pages 199-212. 2009.
-
(2009)
16th CCS
, pp. 199-212
-
-
Ristenpart, T.1
-
31
-
-
50249130247
-
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
Mar.
-
S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In EuroSys, Mar. 2007.
-
(2007)
EuroSys
-
-
Soltesz, S.1
Pötzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
34
-
-
34547331261
-
Covert and side channels due to processor architecture
-
Dec.
-
Z. Wang and R. B. Lee. Covert and side channels due to processor architecture. In 22nd ACSAC, Dec. 2006.
-
(2006)
22nd ACSAC
-
-
Wang, Z.1
Lee, R.B.2
|