|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 65 occurrences of 59 keywords
|
|
|
Results
Found 59 publication records. Showing 59 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
142 | Jaroslaw Paduch, Jamie Levy, Bilal Khan |
Using a secure permutational covert channel to detect local and wide area interposition attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
ARP, interposition, protocols, covert channels, DNS |
86 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
81 | Marc González 0001, Albert Serra, Xavier Martorell, José Oliver 0002, Eduard Ayguadé, Jesús Labarta, Nacho Navarro |
Applying Interposition Techniques for Performance Analysis of OpenMP Parallel Applications. |
IPDPS |
2000 |
DBLP DOI BibTeX RDF |
|
73 | Ennio Grasso |
Implementing interposition in CORBA Object Transaction Service. |
EDOC |
1997 |
DBLP DOI BibTeX RDF |
CORBA object model, Object Transaction Service, implementation design, Orbix, transaction objects interposition, object-oriented methods, distributed transactions, object request broker |
64 | Carlo Bellettini, Julian L. Rrushi |
A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
64 | John Reumann, Kang G. Shin |
Stateful distributed interposition. |
ACM Trans. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
component services, distributed context, multitiered services, Distributed computing, operating systems, server consolidation |
64 | Claude Duchesne, Jean-Yves Hervé |
A Point-Based Approach to the Interposition Problem in Augmented Reality. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
61 | Christof Fetzer, Martin Süßkraut |
Switchblade: enforcing dynamic personalized system call models. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
system call interposition, system call models, security, taint analysis |
52 | Stephanie Balzer, Thomas R. Gross |
Modular reasoning about invariants over shared state with interposed data members. |
PLPV |
2010 |
DBLP DOI BibTeX RDF |
ownership type systems, invariants |
52 | Philip W. L. Fong, Simon A. Orr |
A Module System for Isolating Untrusted Software Extensions. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Kevin Scott, Jack W. Davidson |
Safe Virtual Execution Using Software Dynamic Translation. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Baomin Xu, Weimin Lian, Qiang Gao |
Migration of enterprise JavaBeans with ProActive Interposition Objects. |
ACM SIGPLAN Notices |
2003 |
DBLP DOI BibTeX RDF |
Component, Migration, Active Object, EJB |
46 | Andrea Baldini, Alfredo Benso, Silvia Chiusano, Paolo Prinetto |
'BOND': An Interposition Agents Based Fault Injector for Windows NT. |
DFT |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Michael B. Jones |
Interposition Agents: Transparently Interposing User Code at the System Interface. |
SOSP |
1993 |
DBLP DOI BibTeX RDF |
|
44 | Nupur Kothari, Kiran Nagaraja, Vijay Raghunathan, Florin Sultan, Srimat T. Chakradhar |
HERMES: A Software Architecture for Visibility and Control in Wireless Sensor Network Deployments. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
interposition, sensor networks, control, software reliability, visibility, SOS |
44 | Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky, Natan Cliffer, M. Frans Kaashoek, Eddie Kohler, Robert Tappan Morris |
Information flow control for standard OS abstractions. |
SOSP |
2007 |
DBLP DOI BibTeX RDF |
DIFC, decentralized information flow control, endpoints, system call interposition, web services, reference monitor |
34 | Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini |
A Live Digital Forensic system for Windows networks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan |
Data Sandboxing: A Technique for Enforcing Confidentiality Policies. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Enol Fernández, Elisa Heymann, Miquel A. Senar |
Resource Management for Interactive Jobs in a Grid Environment. |
CLUSTER |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Fareed Zaffar, Gershon Kedem, Ashish Gehani |
Paranoid: A Global Secure File Access Control System. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Alfredo Benso, Silvia Chiusano, Paolo Prinetto |
A COTS Wrapping Toolkit for Fault Tolerant Applications under Windows NT. |
IOLTW |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Steven Wei Der Chien, Kento Sato, Artur Podobas, Niclas Jansson, Stefano Markidis, Michio Honda |
Accelerating Scientific Application through Transparent I/O Interposition. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Hugo Sadok, Zhipeng Zhao, Valerie Choung, Nirav Atre, Daniel S. Berger, James C. Hoe, Aurojit Panda, Justine Sherry |
We need kernel interposition over the network dataplane. |
HotOS |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Gionata Fragomeni, Michele Rossi |
Peripheral extracorporeal membrane oxygenation with interposition graft. The outflow is highly dependent on the anastomotic angle. |
BIBM |
2019 |
DBLP DOI BibTeX RDF |
|
29 | T. Stephen Strickland, Sam Tobin-Hochstadt, Robert Bruce Findler, Matthew Flatt |
Chaperones and impersonators: run-time support for reasonable interposition. |
OOPSLA |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Philip J. Guo, Dawson R. Engler |
CDE: Using System Call Interposition to Automatically Create Portable Software Packages. |
USENIX Annual Technical Conference |
2011 |
DBLP BibTeX RDF |
|
29 | Bo Li 0005, Jianxin Li 0002, Tianyu Wo, Chunming Hu, Liang Zhong |
A VMM-Based System Call Interposition Framework for Program Monitoring. |
ICPADS |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Deen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu 0010 |
A Heuristic Policy-based System Call Interposition in Dynamic Binary Translation. |
MASS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Matús Harvan, Alexander Pretschner |
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement |
29 | Se-Won Kim, Jae-Hyun Hwang, Jin-Hee Choi, Chuck Yoo |
Sentry: A Binary-Level Interposition Mechanism for Trusted Kernel Extension. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Claude Duchesne, Jean-Yves Hervé |
A Regularized Technique for Real-time Interposition of 3D Objects in Augmented Reality. |
SMC |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Tal Garfinkel, Ben Pfaff, Mendel Rosenblum |
Ostia: A Delegating Architecture for Secure System Call Interposition. |
NDSS |
2004 |
DBLP BibTeX RDF |
|
29 | Tal Garfinkel |
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. |
NDSS |
2003 |
DBLP BibTeX RDF |
|
29 | Douglas Thain, Miron Livny |
Multiple Bypass: Interposition Agents for Distributed Computing. |
Clust. Comput. |
2001 |
DBLP DOI BibTeX RDF |
|
29 | K. Jain, R. Sekar 0001 |
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. |
NDSS |
2000 |
DBLP BibTeX RDF |
|
29 | Claude Duchesne, Jean-Yves Hervé |
Comparison of matching criteria for the interposition problem in augmented reality. |
SMC |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Michael B. Jones |
Interposition Agents: Transparently Interposing User Code at the System Interface. |
Secure Internet Programming |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Timothy W. Curry |
Profiling and Tracing Dynamic Library Usage Via Interposition. |
USENIX Summer |
1994 |
DBLP BibTeX RDF |
|
27 | Elizabeth Stinson, John C. Mitchell |
Characterizing Bots' Remote Control Behavior. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
host-based, behavior-based, taint, interposition, detection, system call |
27 | Richard W. Vuduc, Martin Schulz 0001, Daniel J. Quinlan, Bronis R. de Supinski, Andreas Sæbjørnsen |
Improving distributed memory applications testing by message perturbation. |
PADTAD |
2006 |
DBLP DOI BibTeX RDF |
MPI profiling, interposition layer |
17 | Enrico Lovat, Alexander Pretschner |
Data-centric multi-layer usage control enforcement: a social network example. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Oren Laadan, Jason Nieh |
Operating system virtualization: practice and experience. |
SYSTOR |
2010 |
DBLP DOI BibTeX RDF |
operating systems, virtualization |
17 | Lujo Bauer, Jay Ligatti, David Walker 0001 |
Composing expressive runtime security policies. |
ACM Trans. Softw. Eng. Methodol. |
2009 |
DBLP DOI BibTeX RDF |
policy-specification language, policy enforcement, Policy composition |
17 | Phil McGachey, Antony L. Hosking, J. Eliot B. Moss |
Classifying Java class transformations for pervasive virtualized access. |
GPCE |
2009 |
DBLP DOI BibTeX RDF |
java, program transformation, object model |
17 | Jian-Wei Ye, Binxing Fang, Jinqiao Shi, Zhi-Gang Wu |
Protecting Mobile Codes Using the Decentralized Label Model. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Martin C. Rinard |
Living in the comfort zone. |
OOPSLA |
2007 |
DBLP DOI BibTeX RDF |
acceptability properties, comfort zone, monitoring, repair, rectification |
17 | Stephanie Balzer, Thomas R. Gross, Patrick Eugster |
A Relational Model of Object Collaborations and Its Use in Reasoning About Relationships. |
ECOOP |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
17 | Oleg Kiselyov, Chung-chieh Shan |
Delimited Continuations in Operating Systems. |
CONTEXT |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module |
17 | Gabriel Parmer, Richard West |
Hijack: Taking Control of COTS Systems for Real-Time User-Level Services. |
IEEE Real-Time and Embedded Technology and Applications Symposium |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie 0001 |
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Andrew Whitaker, Richard S. Cox, Marianne Shaw, Steven D. Gribble |
Rethinking the Design of Virtual Machine Monitors. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
virtual machines, computer architectures, software systems, virtualization technology |
17 | Douglas Thain |
Identity Boxing: A New Technique for Consistent Global Identity. |
SC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Consistency analysis of authorization hook placement in the Linux security modules framework. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, access control models |
17 | Jenny Dankelman |
Surgical robots and other training tools in minimally invasive surgery. |
SMC (3) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini |
A Host Intrusion Prevention System for Windows Operating Systems. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Antony Edwards, Trent Jaeger, Xiaolan Zhang 0001 |
Runtime verification of authorization hook placement for the linux security modules framework. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Jan J. Koenderink, Andrea J. van Doorn, Kristin J. Dana, Shree K. Nayar |
Bidirectional Reflection Distribution Function of Thoroughly Pitted Surfaces. |
Int. J. Comput. Vis. |
1999 |
DBLP DOI BibTeX RDF |
Bidrectional Reflection Distribution Function, surface scattering, texture, photometry, physical properties |
Displaying result #1 - #59 of 59 (100 per page; Change: )
|
|