Information Technology Reference
In-Depth Information
Baliga, A., Ganapathy, V., & Iftode, L. (2008).
Automatic Inference and Enforcement of Kernel
Data Structure Invariants. In Proceedings of the
2008 Annual Computer Security and Applications
Conference , Anaheim, CA.
Marsaglia, G. (1996). The marsaglia random
number cdrom including the diehard battery of
tests of randomness . Retrieved from http://stat.
fsu.edu/pub/diehard
McCalpin, J. D. (1995). Memory bandwidth and
machine balance in current high performance
computers. IEEE Technical Committee on Com-
puter Architecture newsletter .
Baliga, A., Iftode, L., & Chen, X. (2008). Auto-
mated Containment of Rootkit Attacks. Elsevier
Journal on Computers and Security , 27 (Nov),
323-334.
McVoy, L., & Staelin, C. (1996). Lmbench: por-
table tools for performance analysis. In Proceed-
ings of the USENIX Annual Technical Conference ,
May 1996.
Baliga, A., Kamat, P., & Iftode, L. (2007). Lurk-
ing in the shadows: Identifying systemic threats
to kernel data. In Proceedings of the 2007 IEEE
Symposium on Security and Privacy , Oakland,
CA.
Moore, D., Shannon, C., Brown, D. J., Voelker,
G. M., & Savage, S. (2006). Inferring internet
denial-of-service activity. ACM Transactions on
Computer Systems .
Butler, J. (2005). Fu rootkit. http://www.rootkit.
com/project.php?id=12 .
Chen, H., Chen, R., Zhang, F., Zang, B., & Yew,
P.-C. (2006). Live updating operating systems
using virtualization. Proceedings of the 2nd
international conference on Virtual execution
environments, Ottawa, Canada.
Myricom: Pioneering high performance com-
puting . (n.d.). Retrieved from http://www.myri.
com
Necula, G. C., McPeak, S., Rahul, S. P., & Weimer,
W. (2002). Cil: Intermediate language and tools
for analysis and transformation of c programs. In
Proceedings of the 11th International Conference
on Compiler Construction, Grenoble, France.
Ernst, M. D., Perkins, J. H., Guo, P. J., McCa-
mant, S., Pacheco, C., Tschantz, M. S., & Xiao,
C. (2007). The Daikon system for dynamic de-
tection of likely invariants. Science of Computer
Programming , 69.
Nick, J., Petroni, L., Fraser, T., Walters, A., &
Arbaugh, W. A. (2006). An architecture for
specification-based detection of semantic integrity
violations in kernel dynamic data. In Proceedings
of the USENIX Security Symposium, Vancouver,
Canada.
Garfinkel, T., & Rosenblum, M. (2003). A virtual
machine introspection based architecture for in-
trusion detection. In Proceedings of the Network
and Distributed Systems Security Symposium ,
San Diego, CA.
Nick, J., Petroni, L., & Hicks, M. (2007). Auto-
mated detection of persistent kernel control-flow
attacks. In Proceedings of the 14th ACM confer-
ence on Computer and Communications Security,
Alexandria, VA.
Gutterman, Z., Pinkas, B., & Reinman, T. (2006).
Analysis of the linux random number generator.
In Proceedings of the 2006 IEEE Symposium on
Security and Privacy , Oakland, CA.
MacAfee AVERT Labs. (2006). Rootkits, part 1
of 3: A growing threat . MacAfee AVERT Labs
Whitepaper.
Norcott, W. (2001). Iozone benchmark . Retrieved
from http://www.iozone.org
Packetstorm . (n.d.). Retrieved from http://packet-
stormsecurity.org/UNIX/penetration/rootkits/.
Search WWH ::




Custom Search