-
1
-
-
85076933451
-
-
December
-
Wikimedia labs database dump. http://dumps.wikimedia.org/en_labswikimedia/20111228/, December 2011.
-
(2011)
Wikimedia Labs Database Dump
-
-
-
2
-
-
77954758373
-
Imperative self-adjusting computation
-
San Francisco, CA, January
-
U. Acar, A. Ahmed, and M. Blume. Imperative self-adjusting computation. In Proceedings of the 35th ACM Symposium on Principles of Programming Languages, San Francisco, CA, January 2008.
-
(2008)
Proceedings of the 35th ACM Symposium on Principles of Programming Languages
-
-
Acar, U.1
Ahmed, A.2
Blume, M.3
-
6
-
-
80053426186
-
Regression test selection techniques: A survey
-
October
-
S. Biswas, R. Mall, M. Satpathy, and S. Sukumaran. Regression test selection techniques: A survey. Informatica, 35(3):289-321, October 2011.
-
(2011)
Informatica
, vol.35
, Issue.3
, pp. 289-321
-
-
Biswas, S.1
Mall, R.2
Satpathy, M.3
Sukumaran, S.4
-
8
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
9
-
-
82655162800
-
Intrusion recovery for database-backed web applications
-
Cascais, Portugal, October
-
R. Chandra, T. Kim, M. Shah, N. Narula, and N. Zeldovich. Intrusion recovery for database-backed web applications. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), pages 101-114, Cascais, Portugal, October 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP)
, pp. 101-114
-
-
Chandra, R.1
Kim, T.2
Shah, M.3
Narula, N.4
Zeldovich, N.5
-
10
-
-
33845391802
-
Vigilante: End-to-end containment of internet worms
-
Brighton, UK, October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
11
-
-
84978401615
-
Re-virt: Enabling intrusion analysis through virtual-machine logging and replay
-
Boston, MA, December
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Re-Virt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), pages 211-224, Boston, MA, December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
12
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Vancouver, Canada, October
-
W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, October 2010.
-
(2010)
Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
13
-
-
85076917638
-
-
Github. SSH key audit. https://github.com/settings/ssh/ audit, 2012.
-
(2012)
SSH Key Audit
-
-
-
14
-
-
33845387415
-
The Taser intrusion recovery system
-
Brighton, UK, October
-
A. Goel, K. Po, K. Farhadi, Z. Li, and E. D. Lara. The Taser intrusion recovery system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), pages 163-176, Brighton, UK, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 163-176
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
Lara, E.D.5
-
16
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
December
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su. Back to the future: A framework for automatic malware removal and system repair. In 22nd Annual Computer Security Applications Conference (AC-SAC), pages 257-268, December 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (AC-SAC)
, pp. 257-268
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
17
-
-
33845409634
-
Detecting past and present intrusions through vulnerability-specific predicates
-
Brighton, UK, October
-
A. Joshi, S. King, G. Dunlap, and P. Chen. Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), pages 91-104, Brighton, UK, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 91-104
-
-
Joshi, A.1
King, S.2
Dunlap, G.3
Chen, P.4
-
19
-
-
85076885083
-
Intrusion recovery using selective re-execution
-
Vancouver, Canada, October
-
T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI), pages 89-104, Vancouver, Canada, October 2010.
-
(2010)
Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 89-104
-
-
Kim, T.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
21
-
-
84872688718
-
Hot crap!
-
San Francisco, CA, April
-
E. Kohler. Hot crap! In Proceedings of the Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems, San Francisco, CA, April 2008.
-
(2008)
Proceedings of the Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems
-
-
Kohler, E.1
-
24
-
-
85026804196
-
-
MediaWiki. MediaWiki. http://www.mediawiki.org, 2012.
-
(2012)
MediaWiki
-
-
-
26
-
-
72249098984
-
PRES: Probabilistic replay with execution sketching on multiprocessors
-
Big Sky, MT, October
-
S. Park, Y. Zhou, W. Xiong, Z. Yin, R. Kaushik, K. H. Lee, and S. Lu. PRES: probabilistic replay with execution sketching on multiprocessors. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, October 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP)
-
-
Park, S.1
Zhou, Y.2
Xiong, W.3
Yin, Z.4
Kaushik, R.5
Lee, K.H.6
Lu, S.7
-
29
-
-
79952032085
-
-
The Open Web Application Security Project. OWASP top 10. http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf, 2010.
-
(2010)
OWASP Top 10
-
-
-
30
-
-
67650079915
-
Efficient online validation with delta execution
-
Washington, DC, March
-
J. Tucek, W. Xiong, and Y. Zhou. Efficient online validation with delta execution. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.
-
(2009)
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Tucek, J.1
Xiong, W.2
Zhou, Y.3
-
31
-
-
67349226826
-
Wikipedia workload analysis for decentralized hosting
-
G. Urdaneta, G. Pierre, and M. van Steen. Wikipedia workload analysis for decentralized hosting. Computer Networks, 53(11): 1830-1845, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.11
, pp. 1830-1845
-
-
Urdaneta, G.1
Pierre, G.2
Van Steen, M.3
-
33
-
-
84863170203
-
Retroactive auditing
-
Shanghai, China, July
-
X. Wang, N. Zeldovich, and M. F. Kaashoek. Retroactive auditing. In Proceedings of the 2nd Asia-Pacific Workshop on Systems, Shanghai, China, July 2011. 5 pages.
-
(2011)
Proceedings of the 2nd Asia-Pacific Workshop on Systems
-
-
Wang, X.1
Zeldovich, N.2
Kaashoek, M.F.3
|