The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing. | 0 | 0.34 | 2020 |
Position Paper: Progressive Memory Safety for WebAssembly | 3 | 0.46 | 2019 |
Towards Practical Default-On Multi-Core Record/Replay. | 10 | 0.50 | 2017 |
XvMotion: unified virtual machine migration over long distance | 17 | 0.58 | 2014 |
The design and evolution of live storage migration in VMware ESX | 41 | 1.51 | 2011 |
Virtual machine contracts for datacenter and cloud computing environments | 20 | 1.68 | 2009 |
VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments | 3 | 0.58 | 2008 |
Towards application security on untrusted operating systems | 14 | 0.90 | 2008 |
What virtualization can do for security | 4 | 0.45 | 2007 |
Compatibility is not transparency: VMM detection myths and realities | 76 | 3.86 | 2007 |
Reducing shoulder-surfing by using gaze-based password entry | 114 | 5.68 | 2007 |
SANE: a protection architecture for enterprise networks | 121 | 29.23 | 2006 |
Virtualization aware file systems: getting beyond the limitations of virtual disks | 46 | 2.96 | 2006 |
When virtual is harder than real: security challenges in virtual machine based computing environments | 108 | 6.01 | 2005 |
Shredding your garbage: reducing data lifetime through secure deallocation | 88 | 9.19 | 2005 |
Data lifetime is a systems problem | 23 | 2.47 | 2004 |
Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!) | 1 | 0.42 | 2004 |
Ostia: A Delegating Architecture for Secure System Call Interposition | 83 | 4.77 | 2004 |
A Virtual Machine Introspection Based Architecture for Intrusion Detection | 638 | 37.33 | 2003 |
Terra: a virtual machine-based platform for trusted computing | 490 | 45.23 | 2003 |
Flexible OS support and applications for trusted computing | 34 | 11.07 | 2003 |
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools | 74 | 6.11 | 2003 |
Fiat lux | 0 | 0.34 | 1999 |