Neon: system support for derived data management
暂无分享,去创建一个
Qing Zhang | Michael Vrable | Amin Vahdat | Stefan Savage | Geoffrey M. Voelker | Alex C. Snoeren | Nabil Schear | Justin Ma | John McCullough | S. Savage | G. Voelker | Justin Ma | Amin Vahdat | A. Snoeren | N. Schear | Qing Zhang | Michael Vrable | J. McCullough
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[3] Brent Callaghan,et al. NFS Version 3 Protocol Specification , 1995, RFC.
[4] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[5] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[6] R. Power. CSI/FBI computer crime and security survey , 2001 .
[7] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[8] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[9] HarrisTim,et al. Xen and the art of virtualization , 2003 .
[10] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[11] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[12] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[13] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[14] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[15] Ravishankar K. Iyer,et al. Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[16] Yuanyuan Zhou,et al. SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs , 2005, 11th International Symposium on High-Performance Computer Architecture.
[17] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[18] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[19] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[20] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[21] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[22] C. Kozyrakis,et al. Deconstructing Hardware Architectures for Security , 2006 .
[23] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[24] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[25] Bei Yu,et al. TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[26] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[27] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[28] Cameron Laird. Taking a Hard-Line Approach to Encryption , 2007, Computer.
[29] Andrew C. Myers,et al. SIF: Enforcing Confidentiality and Integrity in Web Applications , 2007, USENIX Security Symposium.
[30] Xin Zheng,et al. Secure web applications via automatic partitioning , 2007, SOSP.
[31] Silas Boyd-Wickizer,et al. Securing Distributed Systems with Information Flow Control , 2008, NSDI.
[32] Timothy Sherwood,et al. Understanding and visualizing full systems with data flow tomography , 2008, ASPLOS.
[33] Eddie Kohler,et al. Manageable fine-grained information flow , 2008, Eurosys '08.
[34] Christoforos E. Kozyrakis,et al. Hardware Enforcement of Application Security Policies Using Tagged Memory , 2008, OSDI.
[35] Andrew S. Tanenbaum,et al. A Virtual Machine Based Information Flow Control System for Policy Enforcement , 2008, Electron. Notes Theor. Comput. Sci..
[36] Kiran-Kumar Muniswamy-Reddy,et al. Causality-based versioning , 2009, TOS.
[37] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.