-
2
-
-
58049195641
-
Accountable internet protocol (AIP)
-
Aug
-
D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet protocol (AIP). In Proceedings of the ACM SIGCOMM Conference (SIGCOMM), Aug. 2008.
-
(2008)
Proceedings of the ACM SIGCOMM Conference (SIGCOMM)
-
-
Andersen, D.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
3
-
-
77956488974
-
-
K. Aoki, J. Franke, A. K. Lenstra, E. Thomé, J. W. Bos, P. Gaudry, A. Kruppa, P. L. Montgomery, D. A. Osvik, H. te Riele, A. Timofeev, and P. Zimmerman. Factorization of a 768-bit RSA modulus. http://eprint.iacr.org/2010/006.pdf.
-
Factorization of a 768-Bit RSA Modulus
-
-
Aoki, K.1
Franke, J.2
Lenstra, A.K.3
Thomé, E.4
Bos, J.W.5
Gaudry, P.6
Kruppa, A.7
Montgomery, P.L.8
Osvik, D.A.9
Te Riele, H.10
Timofeev, A.11
Zimmerman, P.12
-
6
-
-
21644433634
-
Xen and the art of virtualization
-
Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
33947511755
-
Cheat-proof playout for centralized and peer-to-peer gaming
-
Feb
-
N. E. Baughman, M. Liberatore, and B. N. Levine. Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Transactions on Networking (ToN), 15(1):1-13, Feb. 2007.
-
(2007)
IEEE/ACM Transactions on Networking (ToN)
, vol.15
, Issue.1
, pp. 1-13
-
-
Baughman, N.E.1
Liberatore, M.2
Levine, B.N.3
-
11
-
-
85065163256
-
ReMus: High availability via asynchronous virtual machine replication
-
Apr
-
B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008.
-
(2008)
Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Cully, B.1
Lefebvre, G.2
Meyer, D.3
Feeley, M.4
Hutchinson, N.5
Warfield, A.6
-
15
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI), Dec. 2002.
-
(2002)
Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI)
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
17
-
-
21644455412
-
TerrA: A virtual machine-based platform for trusted computing
-
Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
19
-
-
80053145661
-
-
Technical Report Max Planck Institute for Software Systems, Sept
-
A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. Technical Report 2010-3, Max Planck Institute for Software Systems, Sept. 2010.
-
(2010)
Accountable Virtual Machines
-
-
Haeberlen, A.1
Aditya, P.2
Rodrigues, R.3
Druschel, P.4
-
28
-
-
76749139025
-
Offline symbolic analysis for multi-processor execution replay
-
Dec
-
D. Lee, M. Said, S. Narayanasamy, Z. Yang, and C. Pereira. Offline symbolic analysis for multi-processor execution replay. In Proceedings of the IEEE/ACM International Symposium on Microarchitecture (MICRO), Dec. 2009.
-
(2009)
Proceedings of the IEEE/ACM International Symposium on Microarchitecture (MICRO)
-
-
Lee, D.1
Said, M.2
Narayanasamy, S.3
Yang, Z.4
Pereira, C.5
-
29
-
-
77952252719
-
Respec: Efficient online multiprocessor replay via speculation and external determinism
-
Mar
-
D. Lee, B. Wester, K. Veeraraghavan, S. Narayanasamy, P. M. Chen, and J. Flinn. Respec: Efficient online multiprocessor replay via speculation and external determinism. In Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Mar. 2010.
-
(2010)
Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Lee, D.1
Wester, B.2
Veeraraghavan, K.3
Narayanasamy, S.4
Chen, P.M.5
Flinn, J.6
-
34
-
-
0025207738
-
A fast signature scheme based on congruential polynomial operations
-
T. Okamoto. A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 36(1):47-53, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 47-53
-
-
Okamoto, T.1
-
35
-
-
85080714809
-
-
site
-
PunkBuster web site. http://www.evenbalance.com/.
-
-
-
-
36
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Oct
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2005.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
38
-
-
74049150145
-
-
Valve Corporation. Valve anti-cheat system (VAC). https://support.steampowered.com/kb article.php? ref=7849-RADZ-6869.
-
Valve Anti-Cheat System (VAC)
-
-
-
39
-
-
52649086050
-
Retrace: Collecting execution trace with virtual machine deterministic replay
-
June
-
M. Xu, V. Malyugin, J. Sheldon, G. Venkitachalam, and B. Weissman. ReTrace: Collecting execution trace with virtual machine deterministic replay. In Proceedings of the Annual Workshop on Modeling, Benchmarking, and Simulation (MoBS), June 2007.
-
(2007)
Proceedings of the Annual Workshop on Modeling, Benchmarking, and Simulation (MoBS)
-
-
Xu, M.1
Malyugin, V.2
Sheldon, J.3
Venkitachalam, G.4
Weissman, B.5
-
40
-
-
66149135782
-
Improving cost, performance, and security of memory encryption and authentication
-
C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin. Improving cost, performance, and security of memory encryption and authentication. ACM SIGARCH Computer Architecture News, 34(2):179-190, 2006.
-
(2006)
ACM SIGARCH Computer Architecture News
, vol.34
, Issue.2
, pp. 179-190
-
-
Yan, C.1
Englender, D.2
Prvulovic, M.3
Rogers, B.4
Solihin, Y.5
|