Information Technology Reference
In-Depth Information
Arnold, M., & Ryder, B. G. (2001). A framework for
reducing the cost of instrumented code. In Proceedings
of the SIGPLAN Conference on Programming Language
Design and Implementation , (pp. 168-179).
Proceedings of the 19th ACM Symposium on Operating
Systems Principles .
Batat, A., & Feitelson, D. G. (2000). Gang scheduling
with memory considerations. In Proceedings of the
14th International Parallel and Distributed Processing
Symposium (IPDPS'2000) , Cancun, Mexico, May 1-5,
(pp. 109-114). Los Alamitos, CA: IEEE.
Arpaci-Dusseau, R. H., Arpaci-Dusseau, N. C., Burnett,
T. E., Denehy, T. J., Engle, H. S., Gunawi, J., & Nu-
gent, F. I. Popovici. (2003). Transforming Policies into
Mechanisms with Infokernel . 19th ACM Symposium on
Operating Systems Principles.
Bates, R. (2004). Buffer overrun madness. ACM Queue,
2 (3).
Artho, C., & Biere, A. (2005). Combined static and dy-
namic analysis. In Proceedings of the 1 st International
Workshop on Abstract Interpretation of Object-oriented
Language (AIOOL 2005) , ENTCS, Paris. Elsevier Sci-
ence Publishing.
Baxter, I. (2004). DMS: Program transformations for
practical scalable software evolution. In Proceedings of
the 26 th International Conference on Software Engineer-
ing , (pp. 625-634).
Beck, M., Bohme, H., Dziadzka, M., Kunitz, U., Magnus,
R., & Verworner, D. (1998). Linux Kernel Internals (2nd
Ed.). Harlow, MA: Addison Wesley, Longman
Bacic, E. M. (n.d.). UNIX & Security. Canadian System
Security Centre, Communications Security Establish-
ment. Retrieved January 7, 2005 from http://andercheran.
aiind.upv.es/toni/unix/Unix_and_Security.ps.gz
Belady, L. A. (1966). A Study of Replacement Algorithms
for Virtual Storage Computers. IBM Systems Journal ,
5 (2), 78-101.
Baliga, A. (2009). Automated Detection and Containment
of Stealth Attacks on the Operating System Kernel . Ph.
D Thesis, Department of Computer Science, Rutgers
Un iversit y.
Benchmark, B. E. N. C. H.-M. A. T. L. A. B. (2004).
Matlab Performance Tests . Natick, MA: The MathWorks,
Inc. Retrieved from http://www.mathworks.com/
Baliga, A., Ganapathy, V., & Iftode, L. (2008). Automatic
Inference and Enforcement of Kernel Data Structure
Invariants. In Proceedings of the 2008 Annual Computer
Security and Applications Conference , Anaheim, CA.
Bershad, B. N., Chambers, C., Eggers, S., Maeda, C.,
McNamee, D., & Pardyak, P. et al (1995). SPIN - An
Extensible Microkernel for Application-specific Operat-
ing System Services. ACM Operating Systems Review,
29 (1).
Baliga, A., Iftode, L., & Chen, X. (2008). Automated
Containment of Rootkit Attacks. Elsevier Journal on
Computers and Security , 27 (Nov), 323-334.
Bhattacharya, S., Tran, J., Sullivan, M., & Mason, C.
(2004). Linux AIO Performance and Robustness for
Enterprise Workloads. In . Proceedings of the Linux
Symposium , 1 , 63-78.
Baliga, A., Kamat, P., & Iftode, L. (2007). Lurking in the
shadows: Identifying systemic threats to kernel data. In
Proceedings of the 2007 IEEE Symposium on Security
and Privacy , Oakland, CA.
Binder, W. (2005). A portable and customizable profil-
ing framework for Java based on bytecode instruction
counting. In Proceedings of the Third Asian Symposium
o n P r o g r a m m i n g L a n g u a g e s a n d S y s t e m s ( A P L A S 2 0 0 5) ,
(LNCS 3780, pp. 178-194).
Baratloo, A., Tsai, T., & Singh, N. (2000). Transparent
Run-Time Defense Against Stack Smashing Attacks. In
Proceedings of the USENIX annual Technical Confer-
ence .
Binder, W., & Hulaas, J. (2004, October). A portable
CPU-management framework for Java. IEEE Internet
Computing , 8 (5), 74-83.
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., et al. (2003). Xen and the art of virtualization. In
Search WWH ::




Custom Search