-
2
-
-
63549113935
-
QVM: An efficient runtime for detecting defects in deployed systems
-
M. Arnold, M. Vechev, and E. Yahav. QVM: An efficient runtime for detecting defects in deployed systems. In Proc. of the 23rd Int'l Conf. on Object-Oriented Programming, Systems, Languages, and Applications, 2008.
-
Proc. of the 23rd Int'l Conf. on Object-Oriented Programming, Systems, Languages, and Applications, 2008
-
-
Arnold, M.1
Vechev, M.2
Yahav, E.3
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. of the 19th Symp. on Operating Systems Principles, 2003.
-
Proc. of the 19th Symp. on Operating Systems Principles, 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
52649155221
-
Flexible hardware acceleration for instruction-grain program monitoring
-
S. Chen, M. Kozuch, T. Strigkos, B. Falsafi, P. B. Gibbons, T. C. Mowry, V. Ramachandran, O. Ruwase, M. Ryan, and E. Vlachos. Flexible hardware acceleration for instruction-grain program monitoring. In Proc. of the 35th Int'l Symp. on Computer Architecture, 2008.
-
Proc. of the 35th Int'l Symp. on Computer Architecture, 2008
-
-
Chen, S.1
Kozuch, M.2
Strigkos, T.3
Falsafi, B.4
Gibbons, P.B.5
Mowry, T.C.6
Ramachandran, V.7
Ruwase, O.8
Ryan, M.9
Vlachos, E.10
-
11
-
-
66749133987
-
Testudo: Heavyweight security analysis via statistical sampling
-
J. L. Greathouse, I. Wagner, D. A. Ramos, G. Bhatnagar, T. Austin, V. Bertacco, and S. Pettie. Testudo: Heavyweight security analysis via statistical sampling. In Proc. of the 41st Int'l Symp. on Microarchitecture, 2008.
-
Proc. of the 41st Int'l Symp. on Microarchitecture, 2008
-
-
Greathouse, J.L.1
Wagner, I.2
Ramos, D.A.3
Bhatnagar, G.4
Austin, T.5
Bertacco, V.6
Pettie, S.7
-
14
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In Proc. of the European Conf. on Computer Systems, 2006.
-
Proc. of the European Conf. on Computer Systems, 2006
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
26
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of the Network and Distributed System Security Symp., 2005.
-
Proc. of the Network and Distributed System Security Symp., 2005
-
-
Newsome, J.1
Song, D.2
-
28
-
-
34547175193
-
Accurate and efficient filtering for the intel thread checker race detector
-
P. Sack, B. E. Bliss, Z. Ma, P. Petersen, and J. Torrellas. Accurate and efficient filtering for the intel thread checker race detector. In the Workshop on Architectural and System Support for Improving Software Dependability, 2006.
-
The Workshop on Architectural and System Support for Improving Software Dependability, 2006
-
-
Sack, P.1
Bliss, B.E.2
Ma, Z.3
Petersen, P.4
Torrellas, J.5
|