暂无分享,去创建一个
Thomas Ristenpart | Michael Swift | Siddhant Bhagat | Deepak Sirone Jegan | Liang Wang | M. Swift | Liang Wang | Siddhant Bhagat | Thomas Ristenpart
[1] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.
[3] Somesh Jha,et al. Detecting Manipulated Remote Call Streams , 2002, USENIX Security Symposium.
[4] Mu Zhang,et al. Towards a Timely Causality Analysis for Enterprise Security , 2018, NDSS.
[5] Eric A. Brewer,et al. Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.
[6] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[7] Rodrigo Fonseca,et al. Pivot tracing , 2018, USENIX ATC.
[8] Xu Chen,et al. Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions , 2008, OSDI.
[9] Emin Gün Sirer,et al. Kronos: the design and implementation of an event ordering service , 2014, EuroSys '14.
[10] Margo I. Seltzer,et al. Provenance-based Intrusion Detection: Opportunities and Challenges , 2018, TaPP.
[11] Big Data Benchmark , 2019, Encyclopedia of Big Data Technologies.
[12] David M. Eyers,et al. Information Flow Audit for PaaS Clouds , 2016, 2016 IEEE International Conference on Cloud Engineering (IC2E).
[13] Jan Vitek,et al. Efficient intrusion detection using automaton inlining , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[14] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[15] Perry Cheng,et al. Building a Chatbot with Serverless Computing , 2016, MOTA@Middleware.
[16] Leonid Ryzhyk,et al. Secure serverless computing using dynamic information flow control , 2018, Proc. ACM Program. Lang..
[17] Yuan He,et al. An Open-Source Benchmark Suite for Microservices and Their Hardware-Software Implications for Cloud & Edge Systems , 2019, ASPLOS.
[18] Yuriy Brun,et al. Leveraging existing instrumentation to automatically infer invariant-constrained models , 2011, ESEC/FSE '11.
[19] Randy H. Katz,et al. X-Trace: A Pervasive Network Tracing Framework , 2007, NSDI.
[20] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[21] Kuang-Ching Wang,et al. The Design and Operation of CloudLab , 2019, USENIX ATC.
[22] Silas Boyd-Wickizer,et al. Securing Distributed Systems with Information Flow Control , 2008, NSDI.
[23] David Wagner,et al. Janus: an Approach for Confinement of Untrusted Applications , 1999 .
[24] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[25] Richard Mortier,et al. Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.
[26] Donald Beaver,et al. Dapper, a Large-Scale Distributed Systems Tracing Infrastructure , 2010 .
[27] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[28] Amin Vahdat,et al. Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.
[29] Adam Bates,et al. Valve: Securing Function Workflows on Serverless Computing Platforms , 2020, WWW.
[30] Anirudh Sivaraman,et al. Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads , 2017, NSDI.
[31] R. Sekar,et al. Dependence-Preserving Data Compaction for Scalable Forensic Analysis , 2018, USENIX Security Symposium.
[32] Jatinder Singh,et al. Camflow: Managed Data-Sharing for Cloud Services , 2015, IEEE Transactions on Cloud Computing.
[33] Mengyuan Li,et al. Peeking Behind the Curtains of Serverless Platforms , 2018, USENIX Annual Technical Conference.
[34] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[35] Ion Stoica,et al. Occupy the cloud: distributed computing for the 99% , 2017, SoCC.
[36] David M. Eyers,et al. Information Flow Control for Secure Cloud Computing , 2014, IEEE Transactions on Network and Service Management.