Understanding data lifetime via whole system simulation
暂无分享,去创建一个
Tal Garfinkel | Mendel Rosenblum | Ben Pfaff | Jim Chow | Kevin Christopher | M. Rosenblum | Ben Pfaff | Jim Chow | Tal Garfinkel | Kevin Christopher
[1] FrazerKen. Building secure software , 2002 .
[2] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[3] Mendel Rosenblum,et al. Embra: fast and flexible machine simulation , 1996, SIGMETRICS '96.
[4] Anoop Gupta,et al. Complete computer system simulation: the SimOS approach , 1995, IEEE Parallel Distributed Technol. Syst. Appl..
[5] Roy T. Fielding,et al. The Apache HTTP Server Project , 1997, IEEE Internet Comput..
[6] Fredrik Larsson,et al. Simics: A Full System Simulation Platform , 2002, Computer.
[7] Michael Burrows,et al. Run-Time Type Checking for Binary Programs , 2003, CC.
[8] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[9] Jeffrey S. Foster,et al. Type qualifiers: lightweight specifications to improve software quality , 2002 .
[10] Peter Gutmann,et al. Data Remanence in Semiconductor Devices , 2001, USENIX Security Symposium.
[11] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[13] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[14] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[15] Peter M. Broadwell,et al. Scrash: A System for Generating Secure Crash Information , 2003, USENIX Security Symposium.
[16] WitchelEmmett,et al. Complete Computer System Simulation , 1995 .
[17] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[18] Mark Russinovich,et al. Inside Microsoft Windows 2000 , 2000 .
[19] Niels Provos,et al. Encrypting Virtual Memory , 2000, USENIX Security Symposium.
[20] Peter Gutmann,et al. Software Generation of Practically Strong Random Numbers , 1998, USENIX Security Symposium.
[21] David Keppel,et al. Shade: a fast instruction-set simulator for execution profiling , 1994, SIGMETRICS.