Papers

Search results

    ConferenceTitleAuthor(s)
    EVT '07Three Voting Protocols: ThreeBallot, VAV, and TwinWarren D. Smith
    SRUTI '07BotTorrent: Misusing BitTorrent to Launch DDoS AttacksKarim El Defrawy, Minas Gjoka
    SRUTI '07Boundary Detection and Containment of Local Worm InfectionsDiego Zamboni, James Riordan, Milton Yates
    SRUTI '07Analyzing Network and Content Characteristics of Spim Using HoneypotsAarjav J. Trivedi, Paul Q. Judge, Sven Krasser
    SRUTI '07A New Service for Increasing the Effectiveness of Network Address BlacklistsJian Zhang, Phillip Porras, Johannes Ullrich
    SRUTI '07Accountability as a ServiceAdam Bender, Neil Spring, Dave Levin, Bobby Bhattacharjee
    USENIX ATC '07Energy Management for Hypervisor-Based Virtual Machines Jan Stoess, Christian Lang, Frank Bellosa
    USENIX ATC '07Xenprobes, a Lightweight User-Space Probing Framework for Xen Virtual Machine Nguyen Anh Quynh, Kuniyasu Suzaki
    USENIX ATC '07Virtual Machine Memory Access Tracing with Hypervisor Exclusive CachePin Lu and Kai Shen
    USENIX ATC '07Hyperion: High Volume Stream Archival for Retrospective Querying Peter Desnoyers, Prashant Shenoy
    USENIX ATC '07Load Shedding in Network Monitoring ApplicationsPere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart, Diego Amores-López, Josep Solé-Pareta
    USENIX ATC '07Configuration Management at Massive Scale: System Design and Experience William Enck, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, William Aiello
    USENIX ATC '07Events Can Make SenseMaxwell Krohn, Eddie Kohler, M. Frans Kaashoek
    USENIX ATC '07MapJAX: Data Structure Abstractions for Asynchronous Web Applications Daniel S. Myers, Jennifer N. Carlisle, James A. Cowling, Barbara H. Liskov
    USENIX ATC '07Sprockets: Safe Extensions for Distributed File Systems Daniel Peek, Edmund B. Nightingale, Brett D. Higgins, Puspesh Kumar, Jason Flinn
    USENIX ATC '07SafeStore: A Durable and Practical Storage System Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin
    USENIX ATC '07POTSHARDS: Secure Long-Term Storage Without Encryption Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti
    USENIX ATC '07Dandelion: Cooperative Content Distribution with Robust IncentivesMichael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki
    USENIX ATC '07Using Provenance to Aid in Personal File SearchSam Shah, Craig A.N. Soules, Gregory R. Ganger, Brian D. Noble
    USENIX ATC '07Supporting Practical Content-Addressable Caching with CZIP Compression KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S. Pai
    USENIX ATC '07Short Paper: Implementation and Performance Evaluation of Fuzzy File Block MatchingBo Han, Pete Keleher
    USENIX ATC '07From Trusted to Secure: Building and Executing Applications That Enforce System SecurityBoniface Hicks, Sandra Rueda, Trent Jaeger
    USENIX ATC '07From STEM to SEAD: Speculative Execution for Automated Defense Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis
    USENIX ATC '07Dynamic Spyware AnalysisManuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Song
    USENIX ATC '07Evaluating Block-level Optimization Through the IO Path Alma Riska

Pages