메뉴 건너뛰기




Volumn , Issue , 2009, Pages 29-42

Bunker: A privacy-oriented platform for network tracing

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; CRYPTOGRAPHY; SYSTEMS ANALYSIS;

EID: 85076892732     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (54)
  • 5
    • 79952272940 scopus 로고    scopus 로고
    • November
    • BBC News. Brown apologises for records loss, November 2007. http://news.bbc.co.uk/1/hi/uk_politics/7104945.stm.
    • (2007) Brown Apologises for Records Loss
  • 6
    • 33749561840 scopus 로고    scopus 로고
    • Virtual machines, virtual security
    • S. M. Bellovin. Virtual machines, virtual security. Communications of the ACM, 49(10), 2006.
    • (2006) Communications of the ACM , vol.49 , Issue.10
    • Bellovin, S.M.1
  • 9
    • 44449130555 scopus 로고    scopus 로고
    • Finding p2p file-sharing using coarse network behaviors
    • M. P. Collins and M. K. Reiter. Finding p2p file-sharing using coarse network behaviors. In Proceedings of ESORICS, 2006.
    • (2006) Proceedings of ESORICS
    • Collins, M.P.1    Reiter, M.K.2
  • 12
    • 70450078948 scopus 로고    scopus 로고
    • Secure virtual architecture: A safe execution environment for commodity operating systems
    • Stevenson, WA, Oct
    • J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: A safe execution environment for commodity operating systems. In 21st ACM SOSP, Stevenson, WA, Oct 2007.
    • (2007) 21st ACM SOSP
    • Criswell, J.1    Lenharth, A.2    Dhurjati, D.3    Adve, V.4
  • 13
    • 70449121907 scopus 로고    scopus 로고
    • Robust TCP stream reassembly in the presence of adversaries
    • Baltimore, MD, July
    • S. Dharmapurikar and V. Paxson. Robust TCP stream reassembly in the presence of adversaries. In 14th USENIX Security Symposium, Baltimore, MD, July 2005.
    • (2005) 14th USENIX Security Symposium
    • Dharmapurikar, S.1    Paxson, V.2
  • 14
  • 16
    • 85076915320 scopus 로고    scopus 로고
    • Electronic Frontier Foundation. RIAA v. Verizon case archive. http://www.eff.org/legal/cases/RIAA_v_Verizon/.
    • RIAA V. Verizon Case Archive
  • 23
    • 77954994394 scopus 로고    scopus 로고
    • IBM. sHype - Secure Hypervisor. http://www.research.ibm.com/secure_systems_department/projects/ hypervis%or/.
    • sHype - Secure Hypervisor
  • 24
    • 17444410728 scopus 로고    scopus 로고
    • Prototyping an armored data vault: Rights management on big brother's computer
    • San Francisco, CA, April
    • A. Iliev and S. Smith. Prototyping an armored data vault: Rights management on big brother's computer. In Privacy-Enhancing Technologies, San Francisco, CA, April 2002.
    • (2002) Privacy-Enhancing Technologies
    • Iliev, A.1    Smith, S.2
  • 28
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • Bolton Landing, NY, October
    • D. Lie, C. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In 19th ACM SOSP, Bolton Landing, NY, October 2003.
    • (2003) 19th ACM SOSP
    • Lie, D.1    Thekkath, C.2    Horowitz, M.3
  • 29
    • 84879848814 scopus 로고
    • Application and analysis of the virtual machine approach to information system security and isolation
    • Cambridge, MA
    • S. E. Madnick and J. J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation. In Proc. of the Workshop on Virtual Computer Systems, Cambridge, MA, 1973.
    • (1973) Proc. Of the Workshop on Virtual Computer Systems
    • Madnick, S.E.1    Donovan, J.J.2
  • 35
    • 10444260259 scopus 로고    scopus 로고
    • A high-level programming environment for packet trace anonymization and transformation
    • Karlsruhe, Germany, August
    • R. Pang and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. In 9th ACM SIGCOMM, Karlsruhe, Germany, August 2003.
    • (2003) 9th ACM SIGCOMM
    • Pang, R.1    Paxson, V.2
  • 37
    • 84855520785 scopus 로고    scopus 로고
    • Technical report, SEC Consult Unternehmensberatung GmbH
    • P. Panholzer. Physical security attacks on windows vista. Technical report, SEC Consult Unternehmensberatung GmbH, 2008. http://www.sec-consult.com/fileadmin/Whitepapers/Vista_Physical_Attacks%.pdf.
    • (2008) Physical Security Attacks on Windows Vista
    • Panholzer, P.1
  • 38
    • 0041513496 scopus 로고    scopus 로고
    • Long-term forecasting of internet backbone traffic: Observations and initial models
    • San Francisco, CA, April
    • K. Papagiannaki, N. Taft, Z.-L. Zhang, and C. Diot. Long-term forecasting of internet backbone traffic: Observations and initial models. In Proc. of INFOCOM, San Francisco, CA, April 2003.
    • (2003) Proc. Of INFOCOM
    • Papagiannaki, K.1    Taft, N.2    Zhang, Z.-L.3    Diot, C.4
  • 39
    • 85084160194 scopus 로고    scopus 로고
    • Encrypting virtual memory
    • Denver, CO, August
    • N. Provos. Encrypting virtual memory. In 9th USENIX Security Symposium, Denver, CO, August 2000.
    • (2000) 9th USENIX Security Symposium
    • Provos, N.1
  • 43
    • 70449824733 scopus 로고    scopus 로고
    • Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • October
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In 21st ACM SOSP, October 2007.
    • (2007) 21st ACM SOSP
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 44
    • 21644434531 scopus 로고
    • DyaD: A system for using physically secure coprocessors
    • J. D. Tygar and B. Yee. Dyad: A system for using physically secure coprocessors. In IP Workshop Proceedings, 1994.
    • (1994) IP Workshop Proceedings
    • Tygar, J.D.1    Yee, B.2
  • 48
  • 52
    • 1242308060 scopus 로고    scopus 로고
    • On the design and performance of prefix-preserving IP traffic trace anonymization
    • J. Xu, J. Fan, M. Ammar, and S. B. Moon. On the design and performance of prefix-preserving IP traffic trace anonymization. In 1st ACM SIGCOMM IMW Workshop, 2001.
    • (2001) 1st ACM SIGCOMM IMW Workshop
    • Xu, J.1    Fan, J.2    Ammar, M.3    Moon, S.B.4
  • 54
    • 73649104404 scopus 로고    scopus 로고
    • AOL executive quits after posting of search data
    • August
    • T. Zeller Jr. AOL executive quits after posting of search data. International Herald Tribune, August 2006.
    • (2006) International Herald Tribune
    • Zeller, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.