|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 24 keywords
|
|
|
Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Lionel Litty, David Lie |
Manitou: a layer-below approach to fighting malware. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
Manitou, malware protection, malware removal, security architecture |
1 | Paul Sack, Brian E. Bliss, Zhiqiang Ma, Paul Petersen, Josep Torrellas |
Accurate and efficient filtering for the Intel thread checker race detector. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
data-race detection |
1 | Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong |
ExecRecorder: VM-based full-system replay for attack analysis and system recovery. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
virtual machines, recovery, malware, worms, replay, invasive software |
1 | Zhenmin Li, Lin Tan 0001, Xuanhui Wang, Shan Lu 0001, Yuanyuan Zhou 0001, Chengxiang Zhai |
Have things changed now?: an empirical study of bug characteristics in modern open source software. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
bug characteristics, security, empirical study, open source, bug detection |
1 | James R. Larus |
Is process or architecture the solution? |
ASID |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shimin Chen, Babak Falsafi, Phillip B. Gibbons, Michael Kozuch, Todd C. Mowry, Radu Teodorescu, Anastassia Ailamaki, Limor Fix, Gregory R. Ganger, Bin Lin 0002, Steven W. Schlosser |
Log-based architectures for general-purpose monitoring of deployed code. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
general-purpose task monitoring, log-based architectures, chip multiprocessors |
1 | Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou |
Improving software security via runtime instruction-level taint checking. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
format string, hardware tagging, buffer overflow |
1 | Li Yang 0001, Lu Peng 0001 |
SecCMP: a secure chip-multiprocessor architecture. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
security, fault-tolerance, encryption, chip-multiprocessor |
1 | Alan L. Cox, Kartik Mohanram, Scott Rixner |
Dependable != unaffordable. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jianli Shen, Guru Venkataramani, Milos Prvulovic |
Tradeoffs in fine-grained heap memory protection. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
heap security, protection granularity, memory protection |
1 | Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zhao |
Hunting Trojan Horses. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
information flow control, program monitoring, run time environment, data labeling |
1 | Josep Torrellas (eds.) |
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID 2006, San Jose, California, USA, October 21, 2006 |
ASID |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mihai Budiu, Úlfar Erlingsson, Martín Abadi |
Architectural support for software-based protection. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
control-flow integrity, software fault isolation, security, control-flow graph, hardware support, memory protection, binary rewriting |
Displaying result #1 - #13 of 13 (100 per page; Change: )
|
|