-
1
-
-
85084161234
-
MapBox: Using parameterized behavior classes to confine applications
-
Denver, CO, Aug
-
A. Acharya and M. Raje. MAPbox: Using Parameterized Behavior Classes to Confine Applications. In Proceedings of the 9th USENIX Security Symposium, Denver, CO, Aug. 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Acharya, A.1
Raje, M.2
-
4
-
-
33845380837
-
THINC: A virtual display architecture for thin-client computing
-
Brighton, United Kingdom, Oct
-
R. A. Baratto, L. N. Kim, and J. Nieh. THINC: A Virtual Display Architecture for Thin-Client Computing. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, Brighton, United Kingdom, Oct. 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Baratto, R.A.1
Kim, L.N.2
Nieh, J.3
-
5
-
-
85084161168
-
TRON: Process-specific File Protection for the UNIX Operating System
-
New Orleans, LA, Jan
-
A. Berman, V. Bourassa, and E. Selberg. TRON: Process-specific File Protection for the UNIX Operating System. In Proceedings of the 1995 USENIX Winter Technical Conference, New Orleans, LA, Jan. 1995.
-
(1995)
Proceedings of the 1995 USENIX Winter Technical Conference
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
6
-
-
85077119434
-
-
Nov
-
bitdefender. Trojan.pws.chromeinject.b. http://www.bitdefender.com/VIRUS-1000451-en-Trojan. PWS.ChromeInject.B.html, Nov. 2008.
-
(2008)
Trojan.Pws.Chromeinject.B.
-
-
-
8
-
-
84870682965
-
Protecting confidential data on personal computers with storage capsules
-
Montreal. Canada, Aug
-
K. Borders, E. V. Weele, B. Lau, and A. Prakash. Protecting Confidential Data on Personal Computers with Storage Capsules. In Proceedings of the 18th USENIX Security Symposium, Montreal. Canada, Aug. 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
-
-
Borders, K.1
Weele, E.V.2
Lau, B.3
Prakash, A.4
-
9
-
-
85077116693
-
-
Btrfs. https://btrfs.wiki.kernel.org.
-
-
-
-
10
-
-
10044275460
-
Subdomain: Parsimonious server security
-
New Orleans, LA, Dec
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Server Security. In Proceedings of the 14th USENIX Systems Administration Conference, New Orleans, LA, Dec. 2000.
-
(2000)
Proceedings of the 14th USENIX Systems Administration Conference
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
16
-
-
85077129113
-
-
Jan
-
GOBBLES Security. Local/Remote Mpg123 Exploit. http://www.opennet.ru/base/exploits/1042565884_668.txt.html, Jan. 2003.
-
(2003)
Local/Remote Mpg123 Exploit
-
-
-
17
-
-
85077114750
-
-
Google. Google Chrome - Features. http://www.google.com/chrome/intl/en/features.html.
-
Google Chrome - Features
-
-
-
18
-
-
84873471297
-
-
Greasemonkey. http://www.greasespot.net/.
-
Greasemonkey
-
-
-
20
-
-
77950815572
-
Application-level Isolation and Recovery with Solitude
-
Glasgow, Scotland, Apr
-
S. Jain, F. Shafique, V. Djeric, and A. Goel. Application-level Isolation and Recovery with Solitude. In Proceedings of the 3rd ACM European Conference on Computer Systems, Glasgow, Scotland, Apr. 2008.
-
(2008)
Proceedings of the 3rd ACM European Conference on Computer Systems
-
-
Jain, S.1
Shafique, F.2
Djeric, V.3
Goel, A.4
-
22
-
-
84944527045
-
-
Sept
-
B. Lampson. Accountability and Freedom. http://research.microsoft.com/en-us/um/people/ blampson/slides/accountabilityandfreedom. ppt, Sept. 2005.
-
(2005)
Accountability and Freedom
-
-
Lampson, B.1
-
23
-
-
84944734361
-
Isolated program execution: An application transparent approach for executing untrusted programs
-
Las Vegas, NV, Dec
-
Z. Liang, V. Venkatakrishnan, and R. Sekar. Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. In Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, Dec. 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
-
-
Liang, Z.1
Venkatakrishnan, V.2
Sekar, R.3
-
27
-
-
85077126588
-
-
Microsoft Corp. SendMessage Function. http://msdn.microsoft.com/en-us/library/ms644950.aspx.
-
SendMessage Function
-
-
-
28
-
-
84978437417
-
The design and implementation of ZAP: A system for migrating computing environments
-
Boston, MA, Dec
-
S. Osman, D. Subhraveti, G. Su, and J. Nieh. The Design and Implementation of Zap: A System for Migrating Computing Environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, Dec. 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
29
-
-
84942460001
-
Virtualization aware file systems: Getting beyond the limitations of virtual disks
-
San Jose, CA, May
-
B. Pfaff, T. Garfinkel, and M. Rosenblum. Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks. In Proceedings of the 3rd Symposium of Networked Systems Design and Implementation, San Jose, CA, May 2006.
-
(2006)
Proceedings of the 3rd Symposium of Networked Systems Design and Implementation
-
-
Pfaff, B.1
Garfinkel, T.2
Rosenblum, M.3
-
30
-
-
0021454263
-
Compositing digital images
-
July
-
T. Porter and T. Duff. Compositing Digital Images. Computer Graphics, 18(3):253-259, July 1984.
-
(1984)
Computer Graphics
, vol.18
, Issue.3
, pp. 253-259
-
-
Porter, T.1
Duff, T.2
-
31
-
-
85094316228
-
Secure isolation of untrusted legacy applications
-
Dallas, TX, Nov
-
S. Potter, J. Nieh, and M. Selsky. Secure Isolation of Untrusted Legacy Applications. In Proceedings of the 21st Conference on Large Installation System Administration, Dallas, TX, Nov. 2007.
-
(2007)
Proceedings of the 21st Conference on Large Installation System Administration
-
-
Potter, S.1
Nieh, J.2
Selsky, M.3
-
36
-
-
3242754339
-
Optimizing the migration of virtual computers
-
Boston, MA, Dec
-
C. P. Sapuntzakis, R. Chandra, B. Pfaff, J. Chow, M. S. Lam, and M. Rosenblum. Optimizing the Migration of Virtual Computers. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, Dec. 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
-
-
Sapuntzakis, C.P.1
Chandra, R.2
Pfaff, B.3
Chow, J.4
Lam, M.S.5
Rosenblum, M.6
-
39
-
-
84875641324
-
-
Oct
-
VMware Inc. VMware Worksation 6.5 Release Notes. http://www.vmware.com/support/ws65/doc/releasenotes_ws65.html, Oct. 2008.
-
(2008)
VMware Worksation 6.5 Release Notes
-
-
-
41
-
-
33745273588
-
Versatility and unix semantics in namespace unification
-
Feb
-
C. P. Wright, J. Dave, P. Gupta, H. Krishnan, D. P. Quigley, E. Zadok, and M. N. Zubair. Versatility and Unix Semantics in Namespace Unification. ACM Transactions on Storage, 2(1):1-32, Feb. 2006.
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.1
, pp. 1-32
-
-
Wright, C.P.1
Dave, J.2
Gupta, P.3
Krishnan, H.4
Quigley, D.P.5
Zadok, E.6
Zubair, M.N.7
|