-
1
-
-
84975279496
-
-
DokuWiki
-
DokuWiki. https://www.dokuwiki.org/.
-
-
-
-
2
-
-
84975311831
-
-
HPC Graph Analysis
-
HPC Graph Analysis. http://www.graphanalysis.org/benchmark/.
-
-
-
-
3
-
-
84975287677
-
-
Intel Trusted Execution Technology
-
Intel Trusted Execution Technology. http://www.intel.com/technology/security/.
-
-
-
-
4
-
-
84975288813
-
-
OpenLDAP
-
OpenLDAP. http://www.openldap.org/.
-
-
-
-
5
-
-
84975323065
-
-
Intel SHA Extensions
-
Intel SHA Extensions, 2013. https://software.intel.com/en-us/articles/intel-sha-extensions.
-
(2013)
-
-
-
6
-
-
84975268681
-
-
AES-GCM Encryption Performance on Intel Xeon E5 v3 Processors
-
AES-GCM Encryption Performance on Intel Xeon E5 v3 Processors, 2015. https://software.intel.com/en-us/articles/aes-gcm-encryption-performance-onintel-xeon-e5-v3-processors.
-
(2015)
-
-
-
7
-
-
84975267924
-
-
AES-NI SSL performance
-
AES-NI SSL performance, 2015. https://calomel.org/aesni-ssl-performance.html.
-
(2015)
-
-
-
8
-
-
84975268668
-
-
FlashArray//m Technical Specs
-
FlashArray//m Technical Specs, 2015. http://www.purestorage.com/products/technical-specifications/.
-
(2015)
-
-
-
9
-
-
84975267927
-
-
Samsung V-NAND SSD
-
Samsung V-NAND SSD, 2015. http://www.samsung.com/global/business/semiconductor/minisite/SSD/global/html/ssd850pro/specifications.html.
-
(2015)
-
-
-
10
-
-
77958454798
-
Persona: An online social network with user-defined privacy
-
Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. Persona: an online social network with user-defined privacy. In SIGCOMM, 2009.
-
(2009)
SIGCOMM
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
11
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding applications from an untrusted cloud with haven. In OSDI, 2014.
-
(2014)
OSDI
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
12
-
-
84875649201
-
Iago attacks: Why the system call API is a bad untrusted RPC interface
-
March
-
Stephen Checkoway and Hovav Shacham. Iago attacks: Why the system call API is a bad untrusted RPC interface. In ASPLOS, March 2013.
-
(2013)
ASPLOS
-
-
Checkoway, S.1
Shacham, H.2
-
13
-
-
0030259934
-
The rio file cache: Surviving operating system crashes
-
Peter M. Chen, Wee Teck Ng, Subhachandra Chandra, Christopher Aycock, and David Rajamani, Gurushankarand Lowell. The rio file cache: Surviving operating system crashes. In ASPLOS, pages 74-83, 1996.
-
(1996)
ASPLOS
, pp. 74-83
-
-
Chen, P.M.1
Teck Ng, W.2
Chandra, S.3
Aycock, C.4
Rajamani, D.5
Lowell, G.6
-
14
-
-
67650799825
-
Overshadow: A virtualizationbased approach to retrofitting protection in commodity operating systems
-
May
-
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffery Dwoskin, and Dan R. K. Ports. Overshadow: A virtualizationbased approach to retrofitting protection in commodity operating systems. In ASPLOS, May 2008.
-
(2008)
ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Christopher Lewis, E.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
15
-
-
0036041421
-
An empirical study of operating systems errors
-
Andy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, and Dawson Engler. An empirical study of operating systems errors. In SOSP, pages 73-88, 2001.
-
(2001)
SOSP
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
17
-
-
84897782769
-
Virtual ghost: Protecting applications from hostile operating systems
-
John Criswell, Nathan Dautenhahn, and Vikram Adve. Virtual Ghost: Protecting Applications from Hostile Operating Systems. In ASPLOS, 2014.
-
(2014)
ASPLOS
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
19
-
-
84880546612
-
Query processing on smart ssds: Opportunities and challenges
-
Jaeyoung Do, Yang-Suk Kee, Jignesh M. Patel, Chanik Park, Kwanghyun Park, and David J. DeWitt. Query processing on smart ssds: Opportunities and challenges. In ACM International Conference on Management of Data (SIGMOD), 2013.
-
(2013)
ACM International Conference on Management of Data (SIGMOD)
-
-
Do, J.1
Kee, Y.-S.2
Patel, J.M.3
Park, C.4
Park, K.5
DeWitt, D.J.6
-
21
-
-
70350475773
-
Problem solving with systemtap
-
Frank Ch. Eigler. Problem solving with systemtap. In The Ottawa Linux Symposium, pages 261-268, 2006.
-
(2006)
The Ottawa Linux Symposium
, pp. 261-268
-
-
Eigler, F.Ch.1
-
22
-
-
84990231617
-
Social networking with frientegrity: Privacy and integrity with an untrusted provider
-
Ariel J Feldman, Aaron Blankstein, Michael J Freedman, and Edward W Felten. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Feldman, A.J.1
Blankstein, A.2
Freedman, M.J.3
Felten, E.W.4
-
23
-
-
84875683130
-
InkTag: Secure applications on an untrusted operating system
-
Owen S. Hofmann, Sangman Kim, Alan M. Dunn, Michael Z. Lee, and Emmett Witchel. InkTag: Secure Applications on an Untrusted Operating System. In ASPLOS, 2013.
-
(2013)
ASPLOS
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
24
-
-
84964358331
-
-
Intel Corporation
-
Intel Corporation. Software Guard Extensions Programming Reference, 2015. https://software.intel. com/sites/default/files/managed/48/88/329298-002.pdf.
-
(2015)
Software Guard Extensions Programming Reference
-
-
-
25
-
-
84940997196
-
-
CyLab, Carnegia Mellon University
-
Yanlin Li, Adrian Perrig, Jonathan McCune, James Newsome, Brandon Baker, andWill Drewry. MiniBox: A two-way sandbox for x86 native code. Technical Report CMU-CyLab-14-001, CyLab, Carnegia Mellon University, 2014.
-
(2014)
MiniBox: A Two-way Sandbox for x86 Native Code. Technical Report CMU-CyLab-14-001
-
-
Li, Y.1
Perrig, A.2
McCune, J.3
Newsome, J.4
Baker, B.5
Drewry, W.6
-
26
-
-
85095120375
-
A study of linux file system evolution
-
Lanyue Lu, Andrea C Arpaci-Dusseau, Remzi H Arpaci-Dusseau, and Shan Lu. A study of linux file system evolution. In FAST, pages 31-44, 2013.
-
(2013)
FAST
, pp. 31-44
-
-
Lu, L.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
Lu, S.4
-
27
-
-
84863098629
-
TrustVisor: Efficient TCB reduction and attestation
-
May
-
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE S&P, May 2010.
-
(2010)
IEEE S&P
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
28
-
-
33846483949
-
Intel virtualization technology: Hardware support for efficient processor virtualization
-
Gil Neiger, Amy Santoni, Felix Leung, Dion Rodgers, and Rich Uhlig. Intel virtualization technology: Hardware support for efficient processor virtualization. In Intel Technology Journal, volume 10, 2006.
-
(2006)
Intel Technology Journal
, vol.10
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
29
-
-
79953094728
-
Faults in linux: Ten years later
-
Nicolas Palix, Gaël Thomas, Suman Saha, Christophe Calvès, Julia Lawall, and Gilles Muller. Faults in linux: Ten years later. In ASPLOS, pages 305-318, 2011.
-
(2011)
ASPLOS
, pp. 305-318
-
-
Palix, N.1
Thomas, G.2
Saha, S.3
Calvès, C.4
Lawall, J.5
Muller, G.6
-
30
-
-
84969670036
-
Appsec: A safe execution environment for security sensitive applications
-
Jianbao Ren, Yong Qi, Yuehua Dai, Xiaoguang Wang, and Yi Shi. Appsec: A safe execution environment for security sensitive applications. In VEE, 2015.
-
(2015)
VEE
-
-
Ren, J.1
Qi, Y.2
Dai, Y.3
Wang, X.4
Shi, Y.5
-
31
-
-
0026812659
-
The design and implementation of a log-structured file system
-
February
-
Mendel Rosenblum and John K. Ousterhout. The design and implementation of a log-structured file system. ACM Trans. Comput. Syst., 10 (1), February 1992.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.1
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
32
-
-
84897768729
-
Using ARM trustzone to build a trusted language runtime for mobile applications
-
Nuno Santos, Himanshu Raj, Stefan Saroiu, and Alec Wolman. Using ARM trustzone to build a trusted language runtime for mobile applications. In ASPLOS, 2014.
-
(2014)
ASPLOS
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
33
-
-
85084161766
-
Scalability in the xfs file system
-
Adam Sweeney, Doug Doucette, Wei Hu, Curtis Anderson, Mike Nishimoto, and Geoff Peck. Scalability in the xfs file system. In USENIX ATC, 1996.
-
(1996)
USENIX ATC
-
-
Sweeney, A.1
Doucette, D.2
Hu, W.3
Anderson, C.4
Nishimoto, M.5
Peck, G.6
-
34
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
Michael M. Swift, Brian N. Bershad, and Henry M. Levy. Improving the reliability of commodity operating systems. In SOSP, pages 207-222, 2003.
-
(2003)
SOSP
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
35
-
-
85007468031
-
Secpod: A framework for virtualization-based security systems
-
Xiaoguang Wang, Yue Chen, Zhi Wang, Yong Qi, and Yajin Zhou. Secpod: a framework for virtualization-based security systems. In USENIX ATC, 2015.
-
(2015)
USENIX ATC
-
-
Wang, X.1
Chen, Y.2
Wang, Z.3
Qi, Y.4
Zhou, Y.5
-
36
-
-
84975222309
-
Controlled-channel attacks: Deterministic side channels for untrusted operating systems
-
Yuanzhong Xu, Weidong Cui, and Marcus Peinado. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE S&P, 2015.
-
(2015)
IEEE S&P
-
-
Xu, Y.1
Cui, W.2
Peinado, M.3
-
37
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
Jisoo Yang and Kang G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In VEE, pages 71-80, 2008.
-
(2008)
VEE
, pp. 71-80
-
-
Yang, J.1
Shin, K.G.2
-
38
-
-
84938813376
-
Is linux kernel oops useful or not
-
Takeshi Yoshimura, Hiroshi Yamada, and Kenji Kono. Is linux kernel oops useful or not. In HotDep, 2012.
-
(2012)
HotDep
-
-
Yoshimura, T.1
Yamada, H.2
Kono, K.3
-
39
-
-
84975306914
-
Hacking team leak shows how secretive zero-day exploit sales work
-
Kim Zetter. Hacking team leak shows how secretive zero-day exploit sales work. Wired, 2015.
-
(2015)
Wired
-
-
Zetter, K.1
|