-
2
-
-
35048891868
-
Keying hash functions for message authentication
-
August
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proc. of Crypto'96, pages 1-15, August 1996.
-
(1996)
Proc. of Crypto'96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
85170006918
-
-
BlackBerry, Inc. BlackBerry Enterprise Server. http://na.blackberry.com/ eng/services/business/server/full/.
-
BlackBerry Enterprise Server
-
-
-
4
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
June
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu. SmartSiren: virus detection and alert for smartphones. In Proc. of MobiSys'07, pages 258-271, June 2007.
-
(2007)
Proc. of MobiSys'07
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
5
-
-
70349145918
-
Decoupling dynamic program analysis from execution in virtual environments
-
June
-
J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In Proc. of USENIX'08, pages 1-14, June 2008.
-
(2008)
Proc. of USENIX'08
, pp. 1-14
-
-
Chow, J.1
Garfinkel, T.2
Chen, P.M.3
-
7
-
-
84872706665
-
-
A. T. W. I. company
-
A. T. W. I. company. Top 500 global sites. http://www.alexa.com/topsites.
-
Top 500 Global Sites
-
-
-
8
-
-
85170007692
-
Vigilante: End-to-end containment of internet worm epidemics
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worm epidemics. In Proc. of SOSP'05, October 2005.
-
Proc. of SOSP'05, October 2005
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
84976713553
-
Concurrent control with "readers" and "writers"
-
P. J. Courtois, F. Heymans, and D. L. Parnas. Concurrent control with "readers" and "writers". Commun. ACM, 14(10):667-668, 1971.
-
(1971)
Commun. ACM
, vol.14
, Issue.10
, pp. 667-668
-
-
Courtois, P.J.1
Heymans, F.2
Parnas, D.L.3
-
10
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
11
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
December
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proc. of OSDI'02, pages 211-224, December 2002.
-
(2002)
Proc. of OSDI'02
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
12
-
-
77952406152
-
Execution replay of multiprocessor virtual machines
-
March
-
G. W. Dunlap, D. G. Lucchetti, M. A. Fetterman, and P. M. Chen. Execution replay of multiprocessor virtual machines. In Proc. of VEE '08, pages 121-130, March 2008.
-
(2008)
Proc. of VEE '08
, pp. 121-130
-
-
Dunlap, G.W.1
Lucchetti, D.G.2
Fetterman, M.A.3
Chen, P.M.4
-
13
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proc. of CCS, pages 235-245, 2009.
-
(2009)
Proc. of CCS
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
16
-
-
67650165549
-
R2: An application-level kernel for record and replay
-
Z. Guo, X. Wang, J. Tang, X. Liu, Z. Xu, M. Wu, M. F. Kaashoek, and Z. Zhang. R2: An application-level kernel for record and replay. In Proc. of OSDI, 2008.
-
Proc. of OSDI, 2008
-
-
Guo, Z.1
Wang, X.2
Tang, J.3
Liu, X.4
Xu, Z.5
Wu, M.6
Kaashoek, M.F.7
Zhang, Z.8
-
17
-
-
0031099876
-
Reexamining the fault density component size connection
-
L. Hatton. Reexamining the fault density component size connection. Software, IEEE, 14(2):89-97, 1997.
-
(1997)
Software, IEEE
, vol.14
, Issue.2
, pp. 89-97
-
-
Hatton, L.1
-
21
-
-
76649138917
-
VirusMeter: Preventing your cellphone from spies
-
L. Liu, G. Yan, X. Zhang, and S. Chen. VirusMeter: Preventing your cellphone from spies. In Proc. of RAID, pages 244-264, 2009.
-
(2009)
Proc. of RAID
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
22
-
-
0034479192
-
Secure execution of java applets using a remote playground
-
D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. IEEE Trans. Softw. Eng., 26(12):1197-1209, 2000.
-
(2000)
IEEE Trans. Softw. Eng.
, vol.26
, Issue.12
, pp. 1197-1209
-
-
Malkhi, D.1
Reiter, M.K.2
-
23
-
-
67650824973
-
Capo: A software-hardware interface for practical deterministic multiprocessor replay
-
March
-
P. Montesinos, M. Hicks, S. T. King, and J. Torrellas. Capo: a software-hardware interface for practical deterministic multiprocessor replay. In Proc. of ASPLOS '09, pages 73-84, March 2009.
-
(2009)
Proc. of ASPLOS '09
, pp. 73-84
-
-
Montesinos, P.1
Hicks, M.2
King, S.T.3
Torrellas, J.4
-
26
-
-
27544515395
-
BugNet: Continuously recording program execution for deterministic replay debugging
-
S. Narayanasamy, G. Pokam, and B. Calder. BugNet: Continuously recording program execution for deterministic replay debugging. SIGARCH Comput. Archit. News, 33(2):284-295, 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.2
, pp. 284-295
-
-
Narayanasamy, S.1
Pokam, G.2
Calder, B.3
-
27
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of NDSS'05, February 2005.
-
Proc. of NDSS'05, February 2005
-
-
Newsome, J.1
Song, D.2
-
30
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
June
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. Virtualized in-cloud security services for mobile devices. In Proc. of MobiVirt '08, pages 31-35, June 2008.
-
(2008)
Proc. of MobiVirt '08
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
33
-
-
78751522051
-
-
I. PalmSource
-
I. PalmSource. OpenBinder. http://www.angryredplanet.com/~hackbod/ openbinder/docs/html/index.html, 2005.
-
(2005)
OpenBinder
-
-
-
34
-
-
78751500807
-
-
Technical report, Vrije Universiteit Amsterdam
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: Zero-day protection for smartphones using the cloud. Technical report, Vrije Universiteit Amsterdam, 2010.
-
(2010)
Paranoid Android: Zero-day Protection for Smartphones Using the Cloud
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
37
-
-
0001641893
-
RecPlay: A fully integrated practical record/replay system
-
M. Ronsse and K. De Bosschere. RecPlay: a fully integrated practical record/replay system. ACM Trans. Comput. Syst., 17(2):133-152, 1999.
-
(1999)
ACM Trans. Comput. Syst.
, vol.17
, Issue.2
, pp. 133-152
-
-
Ronsse, M.1
De Bosschere, K.2
-
38
-
-
0343782170
-
Replay for concurrent non-deterministic shared-memory applications
-
May
-
M. Russinovich and B. Cogswell. Replay for concurrent non-deterministic shared-memory applications. In Proc. of PLDI '96, pages 258-266, May 1996.
-
(1996)
Proc. of PLDI '96
, pp. 258-266
-
-
Russinovich, M.1
Cogswell, B.2
-
40
-
-
74049104017
-
Ripley: Automatically securing web 2.0 applications through replicated execution
-
K. Vikram, A. Prateek, and B. Livshits. Ripley: automatically securing web 2.0 applications through replicated execution. In Proc. of CCS, pages 173-186, 2009.
-
(2009)
Proc. of CCS
, pp. 173-186
-
-
Vikram, K.1
Prateek, A.2
Livshits, B.3
-
41
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
June
-
J. Xu and N. Nakka. Defeating memory corruption attacks via pointer taintedness detection. In Proc. of DSN '05, pages 378-387, June 2005.
-
(2005)
Proc. of DSN '05
, pp. 378-387
-
-
Xu, J.1
Nakka, N.2
-
42
-
-
0038684791
-
A "flight data recorder" for enabling full-system multiprocessor deterministic replay
-
M. Xu, R. Bodik, and M. D. Hill. A "flight data recorder" for enabling full-system multiprocessor deterministic replay. SIGARCH Comput. Archit. News, 31(2):122-135, 2003.
-
(2003)
SIGARCH Comput. Archit. News
, vol.31
, Issue.2
, pp. 122-135
-
-
Xu, M.1
Bodik, R.2
Hill, M.D.3
|