-
1
-
-
77954900838
-
Increasing memory density by using KSM
-
Arcangeli, A., Eidus, I., and Wright, C., Increasing memory density by using KSM, Linux Symposium, 19-28, 2009.
-
(2009)
Linux Symposium
, pp. 19-28
-
-
Arcangeli, A.1
Eidus, I.2
Wright, C.3
-
2
-
-
0031538389
-
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
-
Bugnion, E., Devine, S., and Rosenblum, M., Disco: Running Commodity Operating Systems on Scalable Multiprocessors, Symposium on Operating Systems Principles (OSDI), 143-156, 1997. (Pubitemid 127466035)
-
(1997)
Operating Systems Review (ACM)
, vol.31
, Issue.5
, pp. 143-156
-
-
Bugnion, E.1
Devine, S.2
Rosenblum, M.3
-
3
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
DOI 10.1145/1346281.1346284, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
Chen, X., Garfinkel, T., Lewis E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., and Ports D. R. K., Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2-13, 2008. (Pubitemid 351585389)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
4
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
Chow, J., Pfaff, B., Garfinkel, T., and Rosenblum, M., Shredding your garbage: reducing data lifetime through secure deallocation, USENIX Security, 22-22, 2005.
-
(2005)
USENIX Security
, pp. 22-22
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
5
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., and Rosenblum, M. Understanding data lifetime via whole system simulation, USENIX Security, 321-336, 2004.
-
(2004)
USENIX Security
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
6
-
-
79957814215
-
SLINKY: Static linking reloaded
-
Collberg, C., Hartman, J.H., Babu, S., and Udupa, S.K., SLINKY: Static Linking Reloaded, USENIX Annual Tech, 309-322, 2005.
-
(2005)
USENIX Annual Tech
, pp. 309-322
-
-
Collberg, C.1
Hartman, J.H.2
Babu, S.3
Udupa, S.K.4
-
7
-
-
85076898936
-
Difference engine: Harnessing memory redundancy in virtual machines
-
Gupta, D., Lee, S., Vrable, M., Savage, S., Snoeren, A.C., Varghese, G., Voelker, G.M., and Vahdat, A., Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Operating Systems Design and Implementation (OSDI), 309-322, 2008.
-
(2008)
Operating Systems Design and Implementation (OSDI)
, pp. 309-322
-
-
Gupta, D.1
Lee, S.2
Vrable, M.3
Savage, S.4
Snoeren, A.C.5
Varghese, G.6
Voelker, G.M.7
Vahdat, A.8
-
8
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
US
-
Halderman J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., and Felten, E.W., Lest We Remember: Cold Boot Attacks on Encryption Keys, USENIX Security, 45-60, 2008.
-
(2008)
ENIX Security
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
9
-
-
85027970456
-
Satori: Enlightened page sharing
-
Miłós, G., Murray, D., Hand, S., and Fetterman, M.A., Satori: Enlightened page sharing, USENIX Annual Tech, 2009.
-
(2009)
USENIX Annual Tech
-
-
Miłós, G.1
Murray, D.2
Hand, S.3
Fetterman, M.A.4
-
10
-
-
84872441303
-
Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine
-
Suzaki, K., Yagi, T. Iijima, K., Quynh, N.A., Artho, C., and Watanabe, Y., Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine, USENIX Workshop on Hot topics in Security (HotSec), 2010.
-
(2010)
USENIX Workshop on Hot Topics in Security (HotSec)
-
-
Suzaki, K.1
Yagi, T.2
Iijima, K.3
Quynh, N.A.4
Artho, C.5
Watanabe, Y.6
-
11
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and Communications Security, 199-212, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
14
-
-
79957824226
-
The impact of multilevel security on database buffer management
-
Warner, A., Li, Q., Keefe. T.F., and Pal S., The impact of multilevel security on database buffer management, 4th European Symposium on Research in Computer Security (ESORICS), 1996.
-
(1996)
4th European Symposium on Research in Computer Security (ESORICS)
-
-
Warner, A.1
Li, Q.2
Keefe, T.F.3
Pal, S.4
|