C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
ASID
2006
2006
2006
Keyphrases
Publications
2006
Lionel Litty
,
David Lie
Manitou: a layer-below approach to fighting malware.
ASID
(2006)
Paul Sack
,
Brian E. Bliss
,
Zhiqiang Ma
,
Paul Petersen
,
Josep Torrellas
Accurate and efficient filtering for the Intel thread checker race detector.
ASID
(2006)
Daniela Alvim Seabra de Oliveira
,
Jedidiah R. Crandall
,
Gary Wassermann
,
Shyhtsun Felix Wu
,
Zhendong Su
,
Frederic T. Chong
ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
ASID
(2006)
Zhenmin Li
,
Lin Tan
,
Xuanhui Wang
,
Shan Lu
,
Yuanyuan Zhou
,
Chengxiang Zhai
Have things changed now?: an empirical study of bug characteristics in modern open source software.
ASID
(2006)
James R. Larus
Is process or architecture the solution?
ASID
(2006)
Shimin Chen
,
Babak Falsafi
,
Phillip B. Gibbons
,
Michael Kozuch
,
Todd C. Mowry
,
Radu Teodorescu
,
Anastassia Ailamaki
,
Limor Fix
,
Gregory R. Ganger
,
Bin Lin
,
Steven W. Schlosser
Log-based architectures for general-purpose monitoring of deployed code.
ASID
(2006)
Jingfei Kong
,
Cliff Changchun Zou
,
Huiyang Zhou
Improving software security via runtime instruction-level taint checking.
ASID
(2006)
Li Yang
,
Lu Peng
SecCMP: a secure chip-multiprocessor architecture.
ASID
(2006)
Alan L. Cox
,
Kartik Mohanram
,
Scott Rixner
Dependable != unaffordable.
ASID
(2006)
Jianli Shen
,
Guru Venkataramani
,
Milos Prvulovic
Tradeoffs in fine-grained heap memory protection.
ASID
(2006)
Micha Moffie
,
Winnie Cheng
,
David R. Kaeli
,
Qin Zhao
Hunting Trojan Horses.
ASID
(2006)
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID 2006, San Jose, California, USA, October 21, 2006
ASID
(2006)
Mihai Budiu
,
Úlfar Erlingsson
,
Martín Abadi
Architectural support for software-based protection.
ASID
(2006)