-
3
-
-
0001916468
-
Mach: A new kernel foundation for UNIX development
-
Altanta, GA, USA USENIX Association
-
M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A new kernel foundation for UNIX development. In Proceedings of the USENIX Annual Technical Conference, USENIX ATC'10, pages 93-112, Altanta, GA, USA, 1986. USENIX Association.
-
(1986)
Proceedings of the USENIX Annual Technical Conference, USENIX ATC'10
, pp. 93-112
-
-
Accetta, M.1
Baron, R.2
Bolosky, W.3
Golub, D.4
Rashid, R.5
Tevanian, A.6
Young, M.7
-
4
-
-
34547540315
-
Deconstructing process isolation
-
New York, NY, USA ACM
-
M. Aiken, M. Fhndrich, C. Hawblitzel, G. Hunt, and J. Larus. Deconstructing process isolation. In Proceedings of the 2006 Workshop on Memory System Performance and Correctness, MSPC '06, pages 1-10, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 2006 Workshop on Memory System Performance and Correctness, MSPC '06
, pp. 1-10
-
-
Aiken, M.1
Fhndrich, M.2
Hawblitzel, C.3
Hunt, G.4
Larus, J.5
-
6
-
-
78650574143
-
DKSM: Subverting virtual machine introspection for fun and profit
-
Washington, DC, USA IEEE Computer Society
-
S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu. DKSM: Subverting virtual machine introspection for fun and profit. In Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems, SRDS '10, pages 82-91, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems, SRDS '10
, pp. 82-91
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
7
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA ACM
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03, pages 164-177, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
84875859350
-
Dune: Safe user-level access to privileged CPU features
-
Berkeley, CA, USA USENIX Association
-
A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D. Mazires, and C. Kozyrakis. Dune: Safe user-level access to privileged CPU features. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12, pages 335-348, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12
, pp. 335-348
-
-
Belay, A.1
Bittau, A.2
Mashtizadeh, A.3
Terei, D.4
Mazires, D.5
Kozyrakis, C.6
-
9
-
-
80054992065
-
Extensibility safety and performance in the SPIN operating system
-
New York, NY, USA ACM
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility safety and performance in the SPIN operating system. In Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95, pages 267-283, New York, NY, USA, 1995. ACM.
-
(1995)
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95
, pp. 267-283
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
10
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
New York, NY, USA ACM
-
M. Castro, M. Costa, J.-P. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black. Fast byte-granularity software fault isolation. In Proceedings of the ACM SIGOPS 22nd symposium on Operating Systems Principles, SOSP '09, pages 45-58, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09
, pp. 45-58
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
11
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Berkeley, CA, USA USENIX Association
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05, pages 12-12, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05
, pp. 12-12
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
12
-
-
0036041421
-
An empirical study of operating systems errors
-
New York, NY, USA ACM
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01, pages 73-88, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
13
-
-
84914181203
-
KCoFI: Complete control-flow integrity for commodity operating system kernels
-
Washington, DC, USA IEEE Computer Society
-
J. Criswell, N. Dautenhahn, and V. Adve. KCoFI: Complete control-flow integrity for commodity operating system kernels. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14, pages 292-307, Washington, DC, USA, 2014. IEEE Computer Society.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14
, pp. 292-307
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
14
-
-
84897782769
-
Virtual ghost: Protecting applications from hostile operating systems
-
New York, NY, USA ACM
-
J. Criswell, N. Dautenhahn, and V. Adve. Virtual ghost: Protecting applications from hostile operating systems. In Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '14, pages 81-96, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '14
, pp. 81-96
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
15
-
-
84912138370
-
Memory safety for low-level software/hardware interactions
-
Berkeley, CA, USA USENIX Association
-
J. Criswell, N. Geoffray, and V. Adve. Memory safety for low-level software/hardware interactions. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, pages 83-100, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09
, pp. 83-100
-
-
Criswell, J.1
Geoffray, N.2
Adve, V.3
-
16
-
-
41149167181
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
New York, NY, USA ACM
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: A safe execution environment for commodity operating systems. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 351-366, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
, pp. 351-366
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
17
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
New York, NY, USA ACM
-
D. R. Engler, M. F. Kaashoek, and J. O'Toole, Jr. Exokernel: An operating system architecture for application-level resource management. In Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95, pages 251-266, New York, NY, USA, 1995. ACM.
-
(1995)
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95
, pp. 251-266
-
-
Engler, D.R.1
Kaashoek, M.F.2
O'Toole, J.3
-
18
-
-
78651539599
-
XFI: Software guards for system address spaces
-
Berkeley, CA, USA USENIX Association
-
Ú. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06, pages 75-88, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
19
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
San Diego, California, USA. The Internet Society
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA. The Internet Society, 2003.
-
(2003)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2003
-
-
Garfinkel, T.1
Rosenblum, M.2
-
20
-
-
84875683130
-
InkTag: Secure applications on an untrusted operating system
-
New York, NY, USA ACM
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. InkTag: Secure applications on an untrusted operating system. In Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13, pages 265-278, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13
, pp. 265-278
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
21
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Aug.
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. J. Comput. Secur., 6(3):151-180, Aug. 1998.
-
(1998)
J. Comput. Secur.
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
22
-
-
84875675910
-
Cyrus: Unintrusive application-level record-replay for replay parallelism
-
New York, NY, USA ACM
-
N. Honarmand, N. Dautenhahn, J. Torrellas, S. T. King, G. Pokam, and C. Pereira. Cyrus: Unintrusive application-level record-replay for replay parallelism. In Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13, pages 193-206, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13
, pp. 193-206
-
-
Honarmand, N.1
Dautenhahn, N.2
Torrellas, J.3
King, S.T.4
Pokam, G.5
Pereira, C.6
-
23
-
-
84905454052
-
Replay debugging: Leveraging record and replay for program debugging
-
Piscataway, NJ, USA IEEE Press
-
N. Honarmand and J. Torrellas. Replay debugging: Leveraging record and replay for program debugging. In Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA '14, pages 445-456, Piscataway, NJ, USA, 2014. IEEE Press.
-
(2014)
Proceeding of the 41st Annual International Symposium on Computer Architecuture, ISCA '14
, pp. 445-456
-
-
Honarmand, N.1
Torrellas, J.2
-
24
-
-
84914124212
-
SoK: Introspections on trust and the semantic gap
-
Washington, DC, USA IEEE Computer Society
-
B. Jain, M. B. Baig, D. Zhang, D. E. Porter, and R. Sion. SoK: Introspections on trust and the semantic gap. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14, pages 605-620, Washington, DC, USA, 2014. IEEE Computer Society.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14
, pp. 605-620
-
-
Jain, B.1
Baig, M.B.2
Zhang, D.3
Porter, D.E.4
Sion, R.5
-
25
-
-
84939170403
-
Ret2dir: Rethinking kernel isolation
-
Berkeley, CA, USA USENIX Association
-
V. P. Kemerlis, M. Polychronakis, and A. D. Keromytis. ret2dir: Rethinking kernel isolation. In Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14, pages 957-972, Berkeley, CA, USA, 2014. USENIX Association.
-
(2014)
Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14
, pp. 957-972
-
-
Kemerlis, V.P.1
Polychronakis, M.2
Keromytis, A.D.3
-
26
-
-
21644490164
-
Backtracking intrusions
-
New York, NY, USA ACM
-
S. T. King and P. M. Chen. Backtracking intrusions. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03, pages 223-236, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 223-236
-
-
King, S.T.1
Chen, P.M.2
-
27
-
-
70349103030
-
-
No Starch Press, San Francisco, CA, USA
-
J. Kong. Designing BSD Rootkits. No Starch Press, San Francisco, CA, USA, 2007.
-
(2007)
Designing BSD Rootkits
-
-
Kong, J.1
-
28
-
-
84883516955
-
On micro-kernel construction
-
New York, NY, USA ACM
-
J. Liedtke. On micro-kernel construction. In Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95, pages 237-250, New York, NY, USA, 1995. ACM.
-
(1995)
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95
, pp. 237-250
-
-
Liedtke, J.1
-
29
-
-
82655175538
-
Software fault isolation with API integrity and multi-principal modules
-
New York, NY, USA ACM
-
Y. Mao, H. Chen, D. Zhou, X. Wang, N. Zeldovich, and M. F. Kaashoek. Software fault isolation with API integrity and multi-principal modules. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pages 115-128, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11
, pp. 115-128
-
-
Mao, Y.1
Chen, H.2
Zhou, D.3
Wang, X.4
Zeldovich, N.5
Kaashoek, M.F.6
-
30
-
-
85084160699
-
Lmbench: Portable tools for performance analysis
-
Berkeley, CA, USA USENIX Association
-
L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference, ATEC '96, pages 23-23, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference, ATEC '96
, pp. 23-23
-
-
McVoy, L.1
Staelin, C.2
-
32
-
-
67650081259
-
Capo: A software-hardware interface for practical deterministic multiprocessor replay
-
New York, NY, USA ACM
-
P. Montesinos, M. Hicks, S. T. King, and J. Torrellas. Capo: A software-hardware interface for practical deterministic multiprocessor replay. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIV, pages 73-84, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIV
, pp. 73-84
-
-
Montesinos, P.1
Hicks, M.2
King, S.T.3
Torrellas, J.4
-
33
-
-
33745201000
-
Anomalous system call detection
-
Feb.
-
D. Mutz, F. Valeur, G. Vigna, and C. Kruegel. Anomalous system call detection. ACM Trans. Inf. Syst. Secur., 9(1):61-93, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
35
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Washington, DC, USA IEEE Computer Society
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08, pages 233-247, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
36
-
-
84881150400
-
QuickRec: Prototyping an intel architecture extension for record and replay of multithreaded programs
-
New York, NY, USA ACM
-
G. Pokam, K. Danne, C. Pereira, R. Kassa, T. Kranich, S. Hu, J. Gottschlich, N. Honarmand, N. Dautenhahn, S. T. King, and J. Torrellas. QuickRec: Prototyping an intel architecture extension for record and replay of multithreaded programs. In Proceedings of the 40th Annual International Symposium on Computer Architecture, ISCA '13, pages 643-654, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 40th Annual International Symposium on Computer Architecture, ISCA '13
, pp. 643-654
-
-
Pokam, G.1
Danne, K.2
Pereira, C.3
Kassa, R.4
Kranich, T.5
Hu, S.6
Gottschlich, J.7
Honarmand, N.8
Dautenhahn, N.9
King, S.T.10
Torrellas, J.11
-
38
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Berlin, Heidelberg Springer-Verlag
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, RAID '08, pages 1-20, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, RAID '08
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
39
-
-
85041481084
-
Design and verification of secure systems
-
New York, NY, USA ACM
-
J. M. Rushby. Design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating Systems Principles, SOSP '81, pages 12-21, New York, NY, USA, 1981. ACM.
-
(1981)
Proceedings of the Eighth ACM Symposium on Operating Systems Principles, SOSP '81
, pp. 12-21
-
-
Rushby, J.M.1
-
40
-
-
0016081584
-
Protection and the control of information sharing in multics
-
July
-
J. H. Saltzer. Protection and the control of information sharing in multics. Commun. ACM, 17(7):388-402, July 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
41
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
43
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
New York, NY, USA ACM
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 335-350, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
44
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
New York, NY, USA ACM
-
M. I. Sharif, W. Lee, W. Cui, and A. Lanzi. Secure in-VM monitoring using hardware virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 477-487, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
45
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
New York, NY, USA ACM
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03, pages 160-171, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
46
-
-
16644400693
-
Improving the reliability of commodity operating systems
-
Feb.
-
M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. ACM Trans. Comput. Syst., 23(1):77-110, Feb. 2005.
-
(2005)
ACM Trans. Comput. Syst.
, vol.23
, Issue.1
, pp. 77-110
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
49
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
New York, NY, USA ACM
-
D. Wagner and P. Soto. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02, pages 255-264, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
50
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Washington, DC, USA IEEE Computer Society
-
Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10, pages 380-395, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
51
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
New York, NY, USA ACM
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 545-554, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
52
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, California, USA, May IEEE Computer Society
-
C. Warrender, S. Forrest, and B. A. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In 1999 IEEE Symposium on Security and Privacy, SP '99, pages 133-145, Oakland, California, USA, May 1999. IEEE Computer Society.
-
(1999)
1999 IEEE Symposium on Security and Privacy, SP '99
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
-
53
-
-
84939132303
-
-
D. Wheeler. SLOCCount, 2015. http://www.dwheeler.com/sloccount/.
-
(2015)
SLOCCount
-
-
Wheeler, D.1
-
55
-
-
84888375834
-
SILVER: Fine-grained and transparent protection domain primitives in commodity OS kernel
-
S. J. Stolfo, A. Stavrou, and C. V. Wright, editors Springer Berlin Heidelberg, Jan.
-
X. Xiong and P. Liu. SILVER: Fine-grained and transparent protection domain primitives in commodity OS kernel. In S. J. Stolfo, A. Stavrou, and C. V. Wright, editors, Research in Attacks, Intrusions, and Defenses, number 8145 in Lecture Notes in Computer Science, pages 103-122. Springer Berlin Heidelberg, Jan. 2013.
-
(2013)
Research in Attacks, Intrusions, and Defenses, Number 8145 in Lecture Notes in Computer Science
, pp. 103-122
-
-
Xiong, X.1
Liu, P.2
-
56
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
New York, NY, USA ACM
-
M. Xu, X. Jiang, R. Sandhu, and X. Zhang. Towards a VMM-based usage control framework for OS kernel integrity protection. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT '07, pages 71-80, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT '07
, pp. 71-80
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
|