-
1
-
-
72249094336
-
ODR: Output-Deterministic Replay for Multicore Debugging
-
ALTEKAR, G., AND STOICA, I. ODR: Output-Deterministic Replay for Multicore Debugging. In Proc. SOSP (2009).
-
(2009)
Proc. SOSP
-
-
ALTEKAR, G.1
STOICA, I.2
-
2
-
-
85030750455
-
Using Magpie for Request Extraction and Workload Modelling
-
BARHAM, P., DONNELLY, A., ISAACS, R., AND MORTIER, R. Using Magpie for Request Extraction and Workload Modelling. In Proc. OSDI (2004).
-
(2004)
Proc. OSDI
-
-
BARHAM, P.1
DONNELLY, A.2
ISAACS, R.3
MORTIER, R.4
-
3
-
-
84870682965
-
Protecting Confidential Data on Personal Computers with Storage Capsules
-
E., AND
-
BORDERS, K., V, E., WEELE, E., LAU, B., AND PRAKASH, A. Protecting Confidential Data on Personal Computers with Storage Capsules. In Proc. Usenix Security (2009).
-
(2009)
Proc. Usenix Security
-
-
BORDERS, K.1
WEELE, E.2
LAU, B.3
PRAKASH, A.4
-
4
-
-
80053199674
-
Microreboot - A technique for cheap recovery
-
CANDEA, G., KAWAMOTO, S., FUJIKI, Y., FRIEDMAN, G., AND FOX, A. Microreboot - A technique for cheap recovery. In Proc. OSDI (2004).
-
(2004)
Proc. OSDI
-
-
CANDEA, G.1
KAWAMOTO, S.2
FUJIKI, Y.3
FRIEDMAN, G.4
FOX, A.5
-
6
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
CHOW, J., PFAFF, B., GARFINKEL, T., CHRISTOPHER, K., AND ROSENBLUM, M. Understanding Data Lifetime via Whole System Simulation. In Proc. USENIX Security (2004).
-
(2004)
Proc. USENIX Security
-
-
CHOW, J.1
PFAFF, B.2
GARFINKEL, T.3
CHRISTOPHER, K.4
ROSENBLUM, M.5
-
7
-
-
84889030419
-
Shredding your garbage: reducing data lifetime through secure deallocation
-
CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM, M. Shredding your garbage: reducing data lifetime through secure deallocation. In Proc. USENIX Security (2005).
-
(2005)
Proc. USENIX Security
-
-
CHOW, J.1
PFAFF, B.2
GARFINKEL, T.3
ROSENBLUM, M.4
-
8
-
-
85092637638
-
Practical Data Confinement
-
Submission
-
ERMOLINSKIY, A., KATTI, S., SHENKER, S., FOWLER, L., AND MCCAULEY, M. Practical Data Confinement, In Submission.
-
-
-
ERMOLINSKIY, A.1
KATTI, S.2
SHENKER, S.3
FOWLER, L.4
MCCAULEY, M.5
-
9
-
-
82655169672
-
Intrusion Recovery Using Selective Re-execution
-
KIM, T., WANG, X., ZELDOVICH, N., AND KAASHOEK, F. Intrusion Recovery Using Selective Re-execution. In Proc. OSDI (2010).
-
(2010)
Proc. OSDI
-
-
KIM, T.1
WANG, X.2
ZELDOVICH, N.3
KAASHOEK, F.4
-
10
-
-
79953672829
-
Dynamic taint analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
NEWSOME, J., AND SONG, D. Dynamic taint analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. NDSS (2005).
-
(2005)
Proc. NDSS
-
-
NEWSOME, J.1
SONG, D.2
-
11
-
-
33947099428
-
File System Design with Assured Delete
-
PERLMAN, R. File System Design with Assured Delete. In Proc. SISW (2005).
-
(2005)
Proc. SISW
-
-
PERLMAN, R.1
|