Monitoring Device Current to Characterize Trim Operations of Solid-State Drives
暂无分享,去创建一个
Hau T. Ngo | Kevin D. Fairbanks | Ryan Rakvic | Justin A. Blanco | James Shey | Owens Walker | Thomas W. Tedesso
[1] Hau T. Ngo,et al. Inferring trimming activity of solid-state drives based on energy consumption , 2016, 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings.
[2] Mehdi Kharrazi,et al. Back to Static Analysis for Kernel-Level Rootkit Detection , 2014, IEEE Transactions on Information Forensics and Security.
[3] Yuanzhang Li,et al. Descrambling data on solid-state disks by reverse-engineering the firmware , 2015 .
[4] Mohammad Yousuf Uddin,et al. Solid state drive data recovery in open source environment , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).
[5] Onur Mutlu,et al. Error Characterization, Mitigation, and Recovery in Flash-Memory-Based Solid-State Drives , 2017, Proceedings of the IEEE.
[6] Jongmoo Choi,et al. SSD Characterization: From Energy Consumption's Perspective , 2011, HotStorage.
[7] Eric Peeters,et al. System-on-Chip Platform Security Assurance: Architecture and Validation , 2018, Proceedings of the IEEE.
[8] Xiaodong Zhang,et al. Understanding intrinsic characteristics and system implications of flash memory based solid state drives , 2009, SIGMETRICS '09.
[9] Ren-Shuo Liu,et al. VST: A virtual stress testing framework for discovering bugs in SSD flash-translation layers , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[10] Dongkun Shin,et al. Performance analysis of SSD write using TRIM in NTFS and EXT4 , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).
[11] Rina Panigrahy,et al. Design Tradeoffs for SSD Performance , 2008, USENIX ATC.
[12] Liang Shi,et al. Towards trustable storage using SSDs with proprietary FTL , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[13] Karl Pearson F.R.S.. LIII. On lines and planes of closest fit to systems of points in space , 1901 .
[14] Richard Boddington,et al. Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery? , 2010 .
[15] Stefano Zanero,et al. A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives , 2013, ACSAC.
[16] Jun Yan,et al. Accurate and Low-Overhead Process-Level Energy Estimation for Modern Hard Disk Drives , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[17] Alexander S. Szalay,et al. Performance modeling and analysis of flash-based storage devices , 2011, 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST).
[18] Christof Paar,et al. Detecting Software Theft in Embedded Systems: A Side-Channel Approach , 2012, IEEE Transactions on Information Forensics and Security.
[19] V. Cruz Machado,et al. Identifying vulnerabilities in the supply chain , 2009, 2009 IEEE International Conference on Industrial Engineering and Engineering Management.
[20] Mircea R. Stan,et al. FlashPower: A detailed power model for NAND flash memory , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).
[21] C. Steger,et al. Energy Consumption Measurement Technique for Automatic Instruction Set Characterization of Embedded Processors , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.
[22] Henry L. Owen,et al. Detecting and categorizing kernel-level rootkits to aid future detection , 2006, IEEE Security & Privacy Magazine.
[23] Jongmoo Choi,et al. VSSIM: Virtual machine based SSD simulator , 2013, 2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST).
[24] Marcin Wójcik,et al. Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests , 2013, ASIACRYPT.
[25] P. Welch. The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .
[26] Alexander Chatzigeorgiou,et al. Energy Consumption Estimation in Embedded Systems , 2006, IMTC 2006.
[27] Steven Swanson,et al. Reliably Erasing Data from Flash-Based Solid State Drives , 2011, FAST.
[28] Hau T. Ngo,et al. Inferring read and write operations of solid-state drives based on energy consumption , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[29] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[30] Wenyuan Xu,et al. WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices , 2013, HealthTech.
[31] Dhruva Acharyya,et al. Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.
[32] Euiseong Seo,et al. Empirical Analysis on Energy Efficiency of Flash-based SSDs , 2008, HotPower.
[33] H. Howie Huang,et al. Black-Box Performance Modeling for Solid-State Drives , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[34] Qiyou Xie,et al. A new method for SSD black-box performance test , 2017, 2017 Progress In Electromagnetics Research Symposium - Spring (PIERS).
[35] Alireza Ejlali,et al. An Accurate Instruction-Level Energy Estimation Model and Tool for Embedded Systems , 2013, IEEE Transactions on Instrumentation and Measurement.
[36] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[37] Theodore Laopoulos,et al. Energy Consumption Estimation in Embedded Systems , 2006, IEEE Transactions on Instrumentation and Measurement.