메뉴 건너뛰기




Volumn , Issue , 2006, Pages 117-130

Flight data recorder: Monitoring persistent-state interactions to improve systems management

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL STORAGE; SCHEDULING ALGORITHMS; SYSTEMS ANALYSIS;

EID: 85076718532     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (43)

References (40)
  • 1
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. Arbaugh, W. Fithen, and J. McHugh. Windows of Vulnerability: A Case Study Analysis. In IEEE Computer, Vol. 33(12)
    • IEEE Computer , vol.33 , Issue.12
    • Arbaugh, W.1    Fithen, W.2    McHugh, J.3
  • 2
    • 1042290191 scopus 로고    scopus 로고
    • Information and control in gray-box systems
    • Banff, Canada
    • A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Information and Control in Gray-Box Systems. In SOSP, Banff, Canada, 2001
    • (2001) SOSP
    • Arpaci-Dusseau, A.C.1    Arpaci-Dusseau, R.H.2
  • 3
    • 84883303431 scopus 로고
    • Measurements of a distributed file system
    • Pacific Grove, CA
    • M. Baker, et al. Measurements of a Distributed File System. In SOSP, Pacific Grove, CA, 1991
    • (1991) SOSP
    • Baker, M.1
  • 5
    • 34548341204 scopus 로고    scopus 로고
    • VpC3: A fast and effective trace-compression algorithm
    • New York, NY
    • M. Burtscher. VPC3: A Fast and Effective Trace-Compression Algorithm. In ACM SIGMETRICS. New York, NY, 2004
    • (2004) ACM SIGMETRICS
    • Burtscher, M.1
  • 6
    • 0040746930 scopus 로고    scopus 로고
    • Query optimization in compressed database systems
    • Santa Barbara, CA
    • Z. Chen, J. Gehrke, F. Korn. Query Optimization In Compressed Database Systems. In ACM SIGMOD. Santa Barbara, CA, 2001
    • (2001) ACM SIGMOD
    • Chen, Z.1    Gehrke, J.2    Korn, F.3
  • 7
    • 0040557408 scopus 로고    scopus 로고
    • A relational model for large shared databanks
    • E. A. Codd. A relational model for large shared databanks. Communications of the ACM, Vol. 13(6)
    • Communications of the ACM , vol.13 , Issue.6
    • Codd, E.A.1
  • 8
    • 33750045537 scopus 로고    scopus 로고
    • WayBack: A User-level Versioning File System for Linux
    • Boston, MA
    • B. Cornell, P. A. Dinda, and F. E. .Bustamente. Wayback: A User-level Versioning File System for Linux. In Usenix Technical. Boston, MA, 2004
    • (2004) Usenix Technical
    • Cornell, B.1    Dinda, P.A.2    Bustamente, F.E.3
  • 9
    • 0002183941 scopus 로고    scopus 로고
    • A large-scale study of file-system content
    • Atlanta, GA
    • J. Douceur, and B. Bolosky. A Large-Scale Study of File-System Content. In ACM SIGMETRICS. Atlanta, GA, 1999
    • (1999) ACM SIGMETRICS
    • Douceur, J.1    Bolosky, B.2
  • 10
    • 4544285425 scopus 로고    scopus 로고
    • Towards a Self-Managing Software Patching Process Using Blacpk-box Persistent-state Manifests
    • New York, NY
    • J. Dunagan, et al. Towards a Self-Managing Software Patching Process Using Blacpk-box Persistent-state Manifests. In ICAC. New York, NY, 2004
    • (2004) ICAC
    • Dunagan, J.1
  • 11
    • 11844249640 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • Boston, MA
    • G. W. Dunlap, et al. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In OSDI, Boston, MA, 2002
    • (2002) OSDI
    • Dunlap, G.W.1
  • 12
    • 4143049367 scopus 로고    scopus 로고
    • Passive NFS tracing of email and research workloads
    • San Francisco, CA
    • D. Ellard, J. Ledlie, P. Malkani, and M. Seltzer. Passive NFS Tracing of Email and Research Workloads. In USENIX FAST, San Francisco, CA, 2003
    • (2003) USENIX FAST
    • Ellard, D.1    Ledlie, J.2    Malkani, P.3    Seltzer, M.4
  • 13
    • 84960382252 scopus 로고    scopus 로고
    • Forensix: A robust, high-performance reconstruction system
    • Columbus, OH
    • A. Goel, et al. Forensix: A Robust, High-Performance Reconstruction System. In ICDCS Security Workshop. Columbus, OH, 2005
    • (2005) ICDCS Security Workshop
    • Goel, A.1
  • 14
    • 0003312832 scopus 로고    scopus 로고
    • Self-similarity in File Systems
    • Madison, WI
    • S. D. Gribble, et al. Self-similarity in File Systems. In ACM SIGMETRICS, Madison, WI, 1998
    • (1998) ACM SIGMETRICS
    • Gribble, S.D.1
  • 15
    • 0043199887 scopus 로고    scopus 로고
    • Characteristics of I/O traffic in personal compute and server workloads
    • W. H. Hau, and A. J. Smith. Characteristics of I/O Traffic in Personal Compute and Server Workloads. IBM Systems Journal. , 347-372, Vol. 42(2)
    • IBM Systems Journal , vol.42 , Issue.2 , pp. 347-372
    • Hau, W.H.1    Smith, A.J.2
  • 17
    • 10644279224 scopus 로고    scopus 로고
    • Backtracking intrusions
    • Bolton Landing, NY
    • S. King, and P. Chen. Backtracking Intrusions. In SOSP, Bolton Landing, NY, 2003
    • (2003) SOSP
    • King, S.1    Chen, P.2
  • 18
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport. Password authentication with insecure communication. In Communications of the ACM, 24(11):770-772, Nov. 1981
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 19
    • 0032681069 scopus 로고    scopus 로고
    • Whole program paths
    • Atlanta, GA
    • J. Larus. Whole Program Paths. In PLDI, Atlanta, GA, 1999
    • (1999) PLDI
    • Larus, J.1
  • 21
    • 0003592399 scopus 로고    scopus 로고
    • The VTrace tool: Building a system tracer for Windows NT and Windows 2000
    • J. Lorch, and A. J. Smith. The VTrace Tool: Building a System Tracer for Windows NT and Windows 2000. MSDN Magazine. , Vol. 15, 10
    • MSDN Magazine , vol.15 , pp. 10
    • Lorch, J.1    Smith, A.J.2
  • 23
    • 85077681170 scopus 로고    scopus 로고
    • Crawler-based Study of Spyware in the Web
    • San Diego, CA
    • A. Moshchuk, T. Bragin, S. D. Gribble, and H. A. Levy, Crawler-based Study of Spyware in the Web. In NDSS, San Diego, CA, 2006
    • (2006) NDSS
    • Moshchuk, A.1    Bragin, T.2    Gribble, S.D.3    Levy, H.A.4
  • 24
    • 84875570984 scopus 로고    scopus 로고
    • Why do Internet services fail, and what can be done about it?
    • Seattle, WA
    • D. Oppenheimer, A. Ganapathi and D. Patterson. Why do Internet services fail, and what can be done about it? In USITS. Seattle, WA, 2003
    • (2003) USITS
    • Oppenheimer, D.1    Ganapathi, A.2    Patterson, D.3
  • 25
    • 84950241176 scopus 로고
    • Analysis of file I/O traces in commercial computing environments
    • Newport, RI
    • K. K. Ramakrishnan, B. Biswas, and R. Karedla. Analysis of File I/O Traces in Commercial Computing Environments. In ACM SIGMETRICS. Newport, RI, 1992
    • (1992) ACM SIGMETRICS
    • Ramakrishnan, K.K.1    Biswas, B.2    Karedla, R.3
  • 26
    • 84962435308 scopus 로고    scopus 로고
    • Security holes... Who cares?
    • Washington, DC
    • E. Rescorla. Security Holes... Who Cares? In USENIX Security Symposium. Washington, DC, 2003
    • (2003) USENIX Security Symposium
    • Rescorla, E.1
  • 27
    • 77957793926 scopus 로고    scopus 로고
    • PIP: Detecting the unexpected in distributed systems
    • San Jose, CA
    • P. Reynolds, et al. Pip: Detecting the unexpected in distributed systems. In NSDI, San Jose, CA, 2006
    • (2006) NSDI
    • Reynolds, P.1
  • 29
  • 31
    • 85076746532 scopus 로고    scopus 로고
    • Metadata efficiency in a comprehensive versioning file system
    • San Francisco, CA
    • C. Soules, G. Goodson, J. Strunk, G. Ganger. Metadata Efficiency in a Comprehensive Versioning File System. In USENIX FAST, San Francisco, CA, 2003
    • (2003) USENIX FAST
    • Soules, C.1    Goodson, G.2    Strunk, J.3    Ganger, G.4
  • 32
    • 33750375032 scopus 로고    scopus 로고
    • Analyzing persistent state interactions to improve state management
    • MSR-TR-2006-39
    • C. Verbowski, et al. Analyzing Persistent State Interactions to Improve State Management, Microsoft Research Technical Report. MSR-TR-2006-39, 2006
    • (2006) Microsoft Research Technical Report
    • Verbowski, C.1
  • 33
    • 84900001356 scopus 로고    scopus 로고
    • File system usage in Windows NT 4.0
    • Charleston, SC
    • W. Vogels. File System Usage in Windows NT 4.0. In SOSP, Charleston, SC, 1999
    • (1999) SOSP
    • Vogels, W.1
  • 34
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • Portland, OR
    • H. Wang, C. Guo, D. Simon, and A..Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM. Portland, OR, 2004
    • (2004) ACM SIGCOMM
    • Wang, H.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4
  • 35
    • 85077048913 scopus 로고    scopus 로고
    • Automatic misconfiguration troubleshooting with peerpressure
    • San Francisco, CA
    • H. Wang, et al. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI. San Francisco, CA, 2004
    • (2004) OSDI
    • Wang, H.1
  • 36
    • 77952114571 scopus 로고    scopus 로고
    • Strider: A Black-box, State-based Approach to Change and Configuration Management and Support
    • San Diego, CA
    • Y.-M. Wang, et al. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. In LISA. San Diego, CA, 2003
    • (2003) LISA
    • Wang, Y.-M.1
  • 37
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • San Diego, CA
    • Y.-M. Wang, et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. In NDSS. San Diego, CA, 2006
    • (2006) NDSS
    • Wang, Y.-M.1
  • 38
    • 79960164190 scopus 로고    scopus 로고
    • Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management
    • Atlanta, GA
    • Y.-M. Wang, et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. In LISA, Atlanta, GA, 2004
    • (2004) LISA
    • Wang, Y.-M.1
  • 39
    • 34548028878 scopus 로고    scopus 로고
    • Configuration debugging as search: Finding the needle in the haystack
    • San Francisco, CA
    • A. Whitaker R. Cox, S. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In OSDI, San Francisco, CA, 2004
    • (2004) OSDI
    • Whitaker, A.1    Cox, R.2    Gribble, S.3
  • 40
    • 1542360009 scopus 로고    scopus 로고
    • Design, implementation, and evaluation of repairable file service
    • San Francisco, CA
    • N. Zhu, T.-C. Chiueh. Design, Implementation, and Evaluation of Repairable File Service. In ICDSN, San Francisco, CA, 2003
    • (2003) ICDSN
    • Zhu, N.1    Chiueh, T.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.