-
2
-
-
72249085354
-
FAWN: A fast array of wimpy nodes
-
Oct.
-
D. G. Andersen, J. Franklin, M. Kaminsky, A. Phanishayee, L. Tan, and V. Vasudevan. FAWN: A fast array of wimpy nodes. In Proc. 22nd ACM SOSP, pages 1-14, Oct. 2009.
-
(2009)
Proc. 22nd ACM SOSP
, pp. 1-14
-
-
Andersen, D.G.1
Franklin, J.2
Kaminsky, M.3
Phanishayee, A.4
Tan, L.5
Vasudevan, V.6
-
3
-
-
84976789801
-
The recovery box: Using fast recovery to provide high availability in the UNIX environment
-
June
-
M. Baker and M. Sullivan. The recovery box: Using fast recovery to provide high availability in the UNIX environment. In Proc. USENIX Summer Conference, pages 31-43, June 1992.
-
(1992)
Proc. USENIX Summer Conference
, pp. 31-43
-
-
Baker, M.1
Sullivan, M.2
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
Oct.
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. 19th ACM SOSP, pages 164-177, Oct. 2003.
-
(2003)
Proc. 19th ACM SOSP
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
47249127725
-
The case for energy-proportional computing
-
December
-
L. A. Barroso and U. Hölzle. The case for energy-proportional computing. IEEE Computer, 40:33-37, December 2007.
-
(2007)
IEEE Computer
, vol.40
, pp. 33-37
-
-
Barroso, L.A.1
Hölzle, U.2
-
6
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
Apr.
-
F. Bellard. QEMU, a fast and portable dynamic translator. In Proc. USENIX ATC, pages 41-46, Apr. 2005.
-
(2005)
Proc. USENIX ATC
, pp. 41-46
-
-
Bellard, F.1
-
7
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
Apr.
-
A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: splitting applications into reduced-privilege compartments. In Proc. 5th USENIX NSDI, pages 309-322, Apr. 2008.
-
(2008)
Proc. 5th USENIX NSDI
, pp. 309-322
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
9
-
-
85084162921
-
Privtrans: Automatically partitioning programs for privilege separation
-
Aug.
-
D. Brumley and D. Song. Privtrans: automatically partitioning programs for privilege separation. In Proc. 13th USENIX Security Symposium, pages 57-72, Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
, pp. 57-72
-
-
Brumley, D.1
Song, D.2
-
10
-
-
80053199674
-
Microreboot -a technique for cheap recovery
-
Dec.
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot -a technique for cheap recovery. In Proc. 6th USENIX OSDI, pages 31-44, Dec. 2004.
-
(2004)
Proc. 6th USENIX OSDI
, pp. 31-44
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
11
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Mar.
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proc. 13th ASPLOS, pages 2-13, Mar. 2008.
-
(2008)
Proc. 13th ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
13
-
-
85059766484
-
Live migration of virtual machines
-
May
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machines. In Proc. 2nd USENIX NSDI, pages 273-286, May 2005.
-
(2005)
Proc. 2nd USENIX NSDI
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
15
-
-
85065163256
-
Remus: High availability via asynchronous virtual machine replication
-
Apr.
-
B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: high availability via asynchronous virtual machine replication. In Proc. 5th USENIX NSDI, pages 161-174, Apr. 2008.
-
(2008)
Proc. 5th USENIX NSDI
, pp. 161-174
-
-
Cully, B.1
Lefebvre, G.2
Meyer, D.3
Feeley, M.4
Hutchinson, N.5
Warfield, A.6
-
16
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Oct.
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In Proc. 15th ACM CCS, pages 51-62, Oct. 2008.
-
(2008)
Proc. 15th ACM CCS
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
17
-
-
82655178754
-
Safe hardware access with the Xen virtual machine monitor
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe hardware access with the Xen virtual machine monitor. In Proc. 1st OASIS, Oct. 2004.
-
Proc. 1st OASIS, Oct. 2004
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
18
-
-
84885588230
-
The Taser intrusion recovery system
-
Oct.
-
A. Goel, K. Po, K. Farhadi, Z. Li, and E. de Lara. The Taser intrusion recovery system. In Proc. 20th ACM SOSP, pages 163-176, Oct. 2005.
-
(2005)
Proc. 20th ACM SOSP
, pp. 163-176
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
De Lara, E.5
-
19
-
-
70350628067
-
Difference engine: Harnessing memory redundancy in virtual machines
-
Oct.
-
D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference engine: harnessing memory redundancy in virtual machines. In Proc. 8th Usenix OSDI, pages 85-93, Oct. 2008.
-
(2008)
Proc. 8th Usenix OSDI
, pp. 85-93
-
-
Gupta, D.1
Lee, S.2
Vrable, M.3
Savage, S.4
Snoeren, A.C.5
Varghese, G.6
Voelker, G.M.7
Vahdat, A.8
-
20
-
-
0007935332
-
The KeyKOS architecture
-
October
-
N. Hardy. The KeyKOS architecture. Operating Systems Review, 19(4):8-25, October 1985.
-
(1985)
Operating Systems Review
, vol.19
, Issue.4
, pp. 8-25
-
-
Hardy, N.1
-
23
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
June
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proc. 37th ACM ISCA, pages 350-361, June 2010.
-
(2010)
Proc. 37th ACM ISCA
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
24
-
-
33646010754
-
Privman: A library for partitioning applications
-
June
-
D. Kilpatrick. Privman: A library for partitioning applications. In Proc. USENIX ATC, pages 273-284, June 2003.
-
(2003)
Proc. USENIX ATC
, pp. 273-284
-
-
Kilpatrick, D.1
-
25
-
-
54049158076
-
Kvm: The Linux virtual machine monitor
-
July
-
A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. kvm: the Linux virtual machine monitor. In Proc. Linux Symposium, pages 225-230, July 2007.
-
(2007)
Proc. Linux Symposium
, pp. 225-230
-
-
Kivity, A.1
Kamay, Y.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
26
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Oct.
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In Proc. 22nd ACM SOSP, pages 207-220, Oct. 2009.
-
(2009)
Proc. 22nd ACM SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
27
-
-
20444377431
-
Udev: A userspace implementation of devfs
-
July
-
G. Kroah-Hartman. udev: A userspace implementation of devfs. In Proc. Linux Symposium, pages 263-271, July 2003.
-
(2003)
Proc. Linux Symposium
, pp. 263-271
-
-
Kroah-Hartman, G.1
-
29
-
-
79953169876
-
ReHype: Enabling VM survival across hypervisor failures
-
Mar.
-
M. Le and Y. Tamir. ReHype: Enabling VM survival across hypervisor failures. In Proc. 7th ACM VEE, pages 63-74, Mar. 2011.
-
(2011)
Proc. 7th ACM VEE
, pp. 63-74
-
-
Le, M.1
Tamir, Y.2
-
31
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
June
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. USENIX ATC, pages 29-42, June 2001.
-
(2001)
Proc. USENIX ATC
, pp. 29-42
-
-
Loscocco, P.1
Smalley, S.2
-
32
-
-
85027970456
-
Satori: Enlightened page sharing
-
June
-
G. Milos, D. G. Murray, S. Hand, and M. A. Fetterman. Satori: Enlightened page sharing. In Proc. USENIX ATC, pages 1-14, June 2009.
-
(2009)
Proc. USENIX ATC
, pp. 1-14
-
-
Milos, G.1
Murray, D.G.2
Hand, S.3
Fetterman, M.A.4
-
33
-
-
77952329878
-
Improving Xen security through disaggregation
-
Mar.
-
D. G. Murray, G. Milos, and S. Hand. Improving Xen security through disaggregation. In Proc. 4th ACM VEE, pages 151-160, Mar. 2008.
-
(2008)
Proc. 4th ACM VEE
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
36
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
Dec.
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a MAC-based security architecture for the Xen open-source hypervisor. In Proc. 21st ACSAC, pages 276-285, Dec. 2005.
-
(2005)
Proc. 21st ACSAC
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
37
-
-
78249261813
-
Using functional frogramming within an industrial product group: Perspectives and perceptions
-
Sept.
-
D. Scott, R. Sharp, T. Gazagnaire, and A. Madhavapeddy. Using functional frogramming within an industrial product group: perspectives and perceptions. In Proc. 15th ICFP, pages 87-92, Sept. 2010.
-
(2010)
Proc. 15th ICFP
, pp. 87-92
-
-
Scott, D.1
Sharp, R.2
Gazagnaire, T.3
Madhavapeddy, A.4
-
38
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Oct.
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proc. 21st ACM SOSP, pages 335-350, Oct. 2007.
-
(2007)
Proc. 21st ACM SOSP
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
40
-
-
67650079952
-
BitVisor: A thin hypervisor for enforcing I/O device security
-
Mar.
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. BitVisor: a thin hypervisor for enforcing I/O device security. In Proc. 5th ACM VEE, pages 121-130, Mar. 2009.
-
(2009)
Proc. 5th ACM VEE
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
41
-
-
85084160641
-
The Flask security architecture: System support for diverse security policies
-
Aug.
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau. The Flask security architecture: System support for diverse security policies. In Proc. 8th USENIX Security Symposium, pages 123-139, Aug. 1999.
-
(1999)
Proc. 8th USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
42
-
-
77954565496
-
NOVA: A microhypervisor-based secure virtualization architecture
-
Apr.
-
U. Steinberg and B. Kauer. NOVA: a microhypervisor-based secure virtualization architecture. In Proc. 5th EuroSys, pages 209-222, Apr. 2010.
-
(2010)
Proc. 5th EuroSys
, pp. 209-222
-
-
Steinberg, U.1
Kauer, B.2
-
43
-
-
33646895419
-
Can we make operating systems reliable and secure?
-
DOI 10.1109/MC.2006.156
-
A. S. Tanenbaum, J. N. Herder, and H. Bos. Can we make operating systems reliable and secure? IEEE Computer, 39(5):44-51, May 2006. (Pubitemid 43786510)
-
(2006)
Computer
, vol.39
, Issue.5
, pp. 44-51
-
-
Tanenbaum, A.S.1
Herder, J.N.2
Bos, H.3
-
44
-
-
63149167330
-
Improving performance by embedding HPC applications in lightweight Xen domains
-
S. Thibault and T. Deegan. Improving performance by embedding HPC applications in lightweight Xen domains. In Proc. 2nd HPCVIRT, Mar. 2008.
-
Proc. 2nd HPCVIRT, Mar. 2008
-
-
Thibault, S.1
Deegan, T.2
-
45
-
-
77954743447
-
Analyzing the energy efficiency of a database server
-
June
-
D. Tsirogiannis, S. Harizopoulos, and M. A. Shah. Analyzing the energy efficiency of a database server. In Proc. ACM SIGMOD, pages 231-242, June 2010.
-
(2010)
Proc. ACM SIGMOD
, pp. 231-242
-
-
Tsirogiannis, D.1
Harizopoulos, S.2
Shah, M.A.3
-
46
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Nov.
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proc. 16th ACM CCS, pages 545-554, Nov. 2009.
-
(2009)
Proc. 16th ACM CCS
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|