Papers

Search results

    ConferenceTitleAuthor(s)
    BSDCon 2003devd—A Device Configuration DaemonM. Warner Losh
    BSDCon 2003ULE: A Modern Scheduler for FreeBSDJeff Roberson
    BSDCon 2003An Automated Binary Security Update System for FreeBSD Colin Percival
    BSDCon 2003Building a High-performance Computing Cluster Using FreeBSDBrooks Davis, Michael AuYeung, Gary Green, Craig Lee
    BSDCon 2003build.sh: Cross-building NetBSDLuke Mewburn, Matthew Green
    BSDCon 2003GBDE—GEOM Based Disk EncryptionPoul-Henning Kamp
    BSDCon 2003Cryptographic Device Support for FreeBSDSamuel J. Leffler
    BSDCon 2003Enhancements to the Fast Filesystem to Support Multi-Terabyte Storage Systems
    BSDCon 2003Running BSD Kernels as User Processes by Partial Emulation and Rewriting of Machine InstructionsHideki Eiraku, Yasushi Shinjo
    BSDCon 2003A Digital Preservation Network Appliance Based on OpenBSDDavid S. H. Rosenthal
    BSDCon 2003Using FreeBSD to Render Realtime Localized Audio and VideoJohn H. Baldwin
    BSDCon 2003Tagging Data in the Network Stack: mbuf_tagsAngelos D. Keromytis
    BSDCon 2003Fast IPSec: A High-Performance IPsec Implementation
    BSDCon 2003The WHBA Project: Experiences "deeply embedding" NetBSDJason R. Thorpe, Allen K. Briggs
    USENIX Security '03802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical SolutionsJohn Bellardo, Stefan Savage
    USENIX Security '03Denial of Service via Algorithmic Complexity AttacksScott A. Crosby, Dan S. Wallach
    USENIX Security '03Plug-and-Play PKI: A PKI Your Mother Can UsePeter Gutmann
    USENIX Security '03Analyzing Integrity Protection in the SELinux Example PolicyTrent Jaeger, Reiner Sailer, Xiaolan Zhang
    USENIX Security '03Security Holes . . . Who Cares?Eric Rescorla
    USENIX Security '03PointGuard™: Protecting Pointers from Buffer Overflow VulnerabilitiesCrispin Cowan, Steve Beattie, John Johansen, Perry Wagle
    USENIX Security '03Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error ExploitsSandeep Bhatkar, Daniel C. DuVarney, R. Sekar
    USENIX Security '03High Coverage Detection of Input-Related Security FaultsEric Larson, Todd Austin
    USENIX Security '03Storage-based Intrusion Detection: Watching Storage Activity for Suspicious BehaviorAdam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger
    USENIX Security '03Detecting Malicious Java Code Using Virtual Machine AuditingSunil Soman, Chandra Krintz, Giovanni Vigna
    USENIX Security '03Static Analysis of Executables to Detect Malicious PatternsMihai Christodorescu, Somesh Jha

Pages