The taser intrusion recovery system
暂无分享,去创建一个
Eyal de Lara | Zheng Li | Ashvin Goel | Kenneth Po | Kamran Farhadi | Ashvin Goel | E. D. Lara | Kenneth Po | K. Farhadi | Zheng Li
[1] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[2] Wu-chi Feng,et al. Forensix: a robust, high-performance reconstruction system , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[3] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[4] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[5] Richard Mortier,et al. Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.
[6] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[7] Ed Bailey,et al. Maximum RPM , 1997 .
[8] Mahadev Satyanarayanan,et al. Flexible and Safe Resolution of File Conflicts , 1995, USENIX.
[9] John S. Heidemann,et al. Resolving File Conflicts in the Ficus File System , 1994, USENIX Summer.
[10] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[11] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[12] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[13] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[14] Norman C. Hutchinson,et al. Deciding when to forget in the Elephant file system , 1999, SOSP.
[15] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[16] Craig A. N. Soules,et al. Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[17] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[18] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.
[19] Sushil Jajodia,et al. Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.
[20] David A. Patterson,et al. Undo for Operators: Building an Undoable E-mail Store , 2003, USENIX Annual Technical Conference, General Track.
[21] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[22] Craig A. N. Soules,et al. Metadata Efficiency in Versioning File Systems , 2003, FAST.
[23] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[24] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[25] Zhenkai Liang,et al. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments , 2005, NDSS.