Information Technology Reference
In-Depth Information
Arnold, M., & Ryder, B. G. (2001). A framework for
reducing the cost of instrumented code. In
Proceedings
of the SIGPLAN Conference on Programming Language
Design and Implementation
, (pp. 168-179).
Proceedings of the 19th ACM Symposium on Operating
Systems Principles
.
Batat, A., & Feitelson, D. G. (2000). Gang scheduling
with memory considerations. In
Proceedings of the
14th International Parallel and Distributed Processing
Symposium (IPDPS'2000)
, Cancun, Mexico, May 1-5,
(pp. 109-114). Los Alamitos, CA: IEEE.
Arpaci-Dusseau, R. H., Arpaci-Dusseau, N. C., Burnett,
T. E., Denehy, T. J., Engle, H. S., Gunawi, J., & Nu-
gent, F. I. Popovici. (2003).
Transforming Policies into
Mechanisms with Infokernel
. 19th ACM Symposium on
Operating Systems Principles.
Bates, R. (2004). Buffer overrun madness.
ACM Queue,
2
(3).
Artho, C., & Biere, A. (2005). Combined static and dy-
namic analysis. In
Proceedings of the 1
st
International
Workshop on Abstract Interpretation of Object-oriented
Language (AIOOL 2005)
, ENTCS, Paris. Elsevier Sci-
ence Publishing.
Baxter, I. (2004). DMS: Program transformations for
practical scalable software evolution. In
Proceedings of
the 26
th
International Conference on Software Engineer-
ing
, (pp. 625-634).
Beck, M., Bohme, H., Dziadzka, M., Kunitz, U., Magnus,
R., & Verworner, D. (1998).
Linux Kernel Internals
(2nd
Ed.). Harlow, MA: Addison Wesley, Longman
Bacic, E. M. (n.d.). UNIX & Security. Canadian System
Security Centre, Communications Security Establish-
ment. Retrieved January 7, 2005 from http://andercheran.
aiind.upv.es/toni/unix/Unix_and_Security.ps.gz
Belady, L. A. (1966). A Study of Replacement Algorithms
for Virtual Storage Computers.
IBM Systems Journal
,
5
(2), 78-101.
Baliga, A. (2009).
Automated Detection and Containment
of Stealth Attacks on the Operating System Kernel
. Ph.
D Thesis, Department of Computer Science, Rutgers
Un iversit y.
Benchmark, B. E. N. C. H.-M. A. T. L. A. B. (2004).
Matlab Performance Tests
. Natick, MA: The MathWorks,
Inc. Retrieved from http://www.mathworks.com/
Baliga, A., Ganapathy, V., & Iftode, L. (2008). Automatic
Inference and Enforcement of Kernel Data Structure
Invariants. In
Proceedings of the 2008 Annual Computer
Security and Applications Conference
, Anaheim, CA.
Bershad, B. N., Chambers, C., Eggers, S., Maeda, C.,
McNamee, D., & Pardyak, P. et al (1995). SPIN - An
Extensible Microkernel for Application-specific Operat-
ing System Services.
ACM Operating Systems Review,
29
(1).
Baliga, A., Iftode, L., & Chen, X. (2008). Automated
Containment of Rootkit Attacks.
Elsevier Journal on
Computers and Security
,
27
(Nov), 323-334.
Bhattacharya, S., Tran, J., Sullivan, M., & Mason, C.
(2004). Linux AIO Performance and Robustness for
Enterprise Workloads. In .
Proceedings of the Linux
Symposium
,
1
, 63-78.
Baliga, A., Kamat, P., & Iftode, L. (2007). Lurking in the
shadows: Identifying systemic threats to kernel data. In
Proceedings of the 2007 IEEE Symposium on Security
and Privacy
, Oakland, CA.
Binder, W. (2005). A portable and customizable profil-
ing framework for Java based on bytecode instruction
counting. In
Proceedings of the Third Asian Symposium
o n P r o g r a m m i n g L a n g u a g e s a n d S y s t e m s ( A P L A S 2 0 0 5)
,
(LNCS 3780, pp. 178-194).
Baratloo, A., Tsai, T., & Singh, N. (2000). Transparent
Run-Time Defense Against Stack Smashing Attacks. In
Proceedings of the USENIX annual Technical Confer-
ence
.
Binder, W., & Hulaas, J. (2004, October). A portable
CPU-management framework for Java.
IEEE Internet
Computing
,
8
(5), 74-83.
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., et al. (2003). Xen and the art of virtualization. In
Search WWH ::
Custom Search