Safe side effects commitment for OS-level virtualization
暂无分享,去创建一个
[1] Shan Lu,et al. Flight data recorder: monitoring persistent-state interactions to improve systems management , 2006, OSDI '06.
[2] Hong Chen,et al. Usable Mandatory Integrity Protection for Operating Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] H. S. Kim,et al. Commercial Antivirus Software Effectiveness: An Empirical Study , 2011, Computer.
[4] Hao Chen,et al. Back to the Future: A Framework for Automatic Malware Removal and System Repair , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[5] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[6] Jun Zhu,et al. Optimizing the Performance of Virtual Machine Synchronization for Fault Tolerance , 2011, IEEE Transactions on Computers.
[7] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[8] Yang Yu,et al. Applications of a feather-weight virtual machine , 2008, VEE '08.
[9] Yang Yu. Os-level virtualization and its applications , 2007 .
[10] Bev Littlewood,et al. Redundancy and Diversity in Security , 2004, ESORICS.
[11] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[12] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[13] Tzi-cker Chiueh,et al. Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing , 2011, ASIACCS '11.
[14] Yang Yu,et al. A feather-weight virtual machine for windows applications , 2006, VEE '06.
[15] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[16] Zhenkai Liang,et al. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments , 2005, NDSS.
[17] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[18] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[19] Robert N. M. Watson,et al. Jails: confining the omnipotent root , 2000 .
[20] Eric Totel,et al. COTS Diversity Based Intrusion Detection and Application to Web Servers , 2005, RAID.
[21] Larry L. Peterson,et al. Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors , 2007, EuroSys '07.
[22] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[23] Dutch T. Meyer,et al. Remus: High Availability via Asynchronous Virtual Machine Replication. (Best Paper) , 2008, NSDI.
[24] Somesh Jha,et al. Automatic Generation of Remediation Procedures for Malware Infections , 2010, USENIX Security Symposium.
[25] Daniel Price,et al. Solaris Zones: Operating System Support for Consolidating Commercial Workloads , 2004, LISA.