Sciweavers

377 search results - page 71 / 76
» Operating system virtualization: practice and experience
Sort
View
USS
2004
13 years 11 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
CCS
2009
ACM
14 years 4 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
TPDS
2008
78views more  TPDS 2008»
13 years 9 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
SIGOPS
2008
123views more  SIGOPS 2008»
13 years 9 months ago
The case for active block layer extensions
Self-managing storage systems have recently received attention from the research community due to their promised ability of continuously adapting to best reflect high-level system...
Jorge Guerra, Luis Useche, Medha Bhadkamkar, Ricar...
ICCAD
2009
IEEE
131views Hardware» more  ICCAD 2009»
13 years 7 months ago
Scheduling with soft constraints
In a behavioral synthesis system, a typical approach used to guide the scheduler is to impose hard constraints on the relative timing between operations considering performance, a...
Jason Cong, Bin Liu, Zhiru Zhang