-
2
-
-
84893254138
-
-
Immunity debugger. http://www.immunityinc.com/products-immdbg.shtml.
-
-
-
-
3
-
-
84893260846
-
-
Solarwinds. http://www.solarwinds.com/log-event-manager/active-response- library.aspx.
-
-
-
-
4
-
-
84893247701
-
-
VMware Horizon Mobile. http://www.vmware.com/products/desktop- virtualization/mobile/overview.html.
-
-
-
-
6
-
-
84893244969
-
-
Floodlight. http://floodlight.openflowhub.org, 2013.
-
(2013)
-
-
-
7
-
-
84893247788
-
-
Linux memory extrator. https://code.google.com/p/lime-forensics/, 2013.
-
(2013)
Linux Memory Extrator
-
-
-
8
-
-
84893282073
-
-
Snort. http://www.snort.org/, 2013.
-
(2013)
-
-
-
11
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh. Cells: a virtual mobile smartphone architecture. In Proc. Symposium on Operating Systems Principles (SOSP), 2011.
-
(2011)
Proc. Symposium on Operating Systems Principles (SOSP)
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
14
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N.C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proc. ACM conference on Computer and communications security (CCS), 2010.
-
(2010)
Proc. ACM Conference on Computer and Communications Security (CCS)
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
16
-
-
80054992065
-
Extensibility safety and performance in the spin operating system
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility safety and performance in the spin operating system. In Proc. symposium on Operating systems principles (SOSP), 1995.
-
(1995)
Proc. Symposium on Operating Systems Principles (SOSP)
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
17
-
-
85013634872
-
A NICE way to test OpenFlow applications
-
Apr.
-
M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford. A NICE way to test OpenFlow applications. In Proc. Network System Design and Implementation (NSDI), Apr. 2012.
-
(2012)
Proc. Network System Design and Implementation (NSDI)
-
-
Canini, M.1
Venzano, D.2
Peresini, P.3
Kostic, D.4
Rexford, J.5
-
18
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: taking control of the enterprise. In Proc. SIGCOMM, 2007.
-
(2007)
Proc. SIGCOMM
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
19
-
-
34447559706
-
The VAD tree: A process-eye view of physical memory
-
B. Dolan-Gavitt. The VAD tree: A process-eye view of physical memory. Digital Investigation, 4: 62-64, 2007.
-
(2007)
Digital Investigation
, vol.4
, pp. 62-64
-
-
Dolan-Gavitt, B.1
-
20
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. In Proc. symposium on Operating systems principles (SOSP), 2005.
-
(2005)
Proc. Symposium on Operating Systems Principles (SOSP)
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
21
-
-
84893208576
-
-
Oct
-
S. Garfinkel. The criminal cloud. http://www.technologyreview.com/news/ 425770/the-criminal-cloud/, Oct 2011.
-
(2011)
The Criminal Cloud
-
-
Garfinkel, S.1
-
22
-
-
33750037341
-
A clean slate 4d approach to network control and management
-
Oct.
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4d approach to network control and management. SIGCOMM Comput. Commun. Rev. (CCR), 35(5): 41-54, Oct. 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev. (CCR)
, vol.35
, Issue.5
, pp. 41-54
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
25
-
-
84863913620
-
-
Springer
-
S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, editors. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, Volume 54 of Advances in Information Security. Springer, 2011.
-
(2011)
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, Volume 54 of Advances in Information Security
-
-
Jajodia, S.1
Ghosh, A.K.2
Swarup, V.3
Wang, C.4
Wang, X.S.5
-
26
-
-
72249120603
-
Sel4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, et al. seL4: Formal verification of an OS kernel. In Proc. symposium on Operating systems principles (SOSP), 2009.
-
(2009)
Proc. Symposium on Operating Systems Principles (SOSP)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
-
27
-
-
57749192483
-
Information flow control for standard os abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard os abstractions. In Proc. symposium on Operating systems principles (SOSP), 2007.
-
(2007)
Proc. Symposium on Operating Systems Principles (SOSP)
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
29
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. (CCR), 38(2), 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev. (CCR)
, vol.38
, Issue.2
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
33
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu. A security enforcement kernel for OpenFlow networks. In Proc. workshop on Hot topics in software defined networks (HotSDN), 2012.
-
(2012)
Proc. Workshop on Hot Topics in Software Defined Networks (HotSDN)
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
35
-
-
84893239054
-
Fresco: Modular composable security services for software-defined networks
-
February
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson. Fresco: Modular composable security services for software-defined networks. In Proc. Network and Distributed System Security Symposium (NDSS), February 2013.
-
(2013)
Proc. Network and Distributed System Security Symposium (NDSS)
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
36
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
A. Wool. A quantitative study of firewall configuration errors. Computer, 37: 62-67, 2004.
-
(2004)
Computer
, vol.37
, pp. 62-67
-
-
Wool, A.1
|