Automatic Integration of BFT State-Machine Replication into IoT Systems | 0 | 0.34 | 2022 |
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus | 1 | 0.35 | 2022 |
A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms | 2 | 0.37 | 2022 |
KVMIveggur: Flexible, secure, and efficient support for self-service virtual machine introspection | 0 | 0.34 | 2022 |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic | 0 | 0.34 | 2022 |
Network Federation for Inter-cloud Operations. | 0 | 0.34 | 2021 |
Agent-Based File Extraction Using Virtual Machine Introspection. | 0 | 0.34 | 2020 |
Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection. | 0 | 0.34 | 2020 |
Self-optimising Application-agnostic Multithreading for Replicated State Machines | 0 | 0.34 | 2020 |
Vmiguard: Detecting And Preventing Service Integrity Violations By Malicious Insiders Using Virtual Machine Introspection | 1 | 0.40 | 2019 |
TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines | 0 | 0.34 | 2019 |
SORRIR: A Resilient Self-organizing Middleware for IoT Applications [Position Paper] | 1 | 0.35 | 2019 |
Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication | 2 | 0.38 | 2019 |
BCRB 2018 introduction. | 0 | 0.34 | 2018 |
Visualizing BFT SMR Distributed Systems - Example of BFT-SMaRt | 0 | 0.34 | 2018 |
Webbft: Byzantine Fault Tolerance For Resilient Interactive Web Applications | 1 | 0.35 | 2018 |
Scaling Byzantine Consensus - A Broad Analysis. | 2 | 0.46 | 2018 |
DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps. | 0 | 0.34 | 2018 |
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. | 1 | 0.37 | 2018 |
Introspection for ARM TrustZone with the ITZ Library | 0 | 0.34 | 2018 |
Resource-Efficient State-Machine Replication with Multithreading and Vertical Scaling | 0 | 0.34 | 2018 |
A few open problems and solutions for software technologies for dependable distributed systems. | 2 | 0.37 | 2017 |
Classifying malware attacks in IaaS cloud environments. | 2 | 0.35 | 2017 |
Analysis of Static and Dynamic Configurability of Existing Group Communication Systems. | 0 | 0.34 | 2017 |
Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems. | 0 | 0.34 | 2017 |
Virtual Machine Introspection Based SSH Honeypot. | 0 | 0.34 | 2017 |
Characterizing loss of digital evidence due to abstraction layers | 0 | 0.34 | 2017 |
Towards intrusion-resilient security monitoring in multi-cloud infrastructures | 0 | 0.34 | 2017 |
A flexible framework for mobile device forensics based on cold boot attacks. | 0 | 0.34 | 2016 |
Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation Environments | 0 | 0.34 | 2016 |
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication | 2 | 0.40 | 2016 |
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers | 0 | 0.34 | 2016 |
Visualizing and Controlling VMI-Based Malware Analysis in IaaS Cloud. | 0 | 0.34 | 2016 |
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. | 1 | 0.38 | 2015 |
Towards a Flexible Virtualization-Based Architecture for Malware Detection and Analysis | 0 | 0.34 | 2014 |
Control-Flow integrity in web applications | 5 | 0.46 | 2013 |
Network Forensics for Cloud Computing. | 3 | 0.50 | 2013 |
Intrusion detection and honeypots in nested virtualization environments | 9 | 0.57 | 2013 |
FITCH: Supporting Adaptive Replicated Services in the Cloud. | 7 | 0.65 | 2013 |
SecureSMART: A Security Architecture for BFT Replication Libraries | 0 | 0.34 | 2012 |
SPARE: Replicas on Hold. | 17 | 0.90 | 2011 |
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services | 3 | 0.41 | 2010 |
Functional decomposition and interactions in hybrid intrusion-tolerant systems | 0 | 0.34 | 2009 |
Using object replication for building a dependable version control system | 1 | 0.41 | 2008 |
FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery | 2 | 0.37 | 2008 |
Adaptive web service migration | 4 | 0.52 | 2008 |
Multithreading Strategies for Replicated Objects | 5 | 0.53 | 2008 |
Towards generic and middleware-independent support for replicated, distributed objects | 3 | 0.49 | 2007 |
Parallel state transfer in object replication systems | 5 | 0.42 | 2007 |
Hypervisor-Based Efficient Proactive Recovery | 31 | 1.21 | 2007 |