팔로우
Samuel T King
Samuel T King
ucdavis.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
GW Dunlap, ST King, S Cinar, MA Basrai, PM Chen
ACM SIGOPS Operating Systems Review 36 (SI), 211-224, 2002
15722002
SubVirt: Implementing malware with virtual machines
ST King, PM Chen
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006
7032006
Debugging the data plane with anteater
H Mai, A Khurshid, R Agarwal, M Caesar, PB Godfrey, ST King
ACM SIGCOMM Computer Communication Review 41 (4), 290-301, 2011
6982011
Backtracking intrusions
ST King, PM Chen
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
6432003
Operating System Support for Virtual Machines.
ST King, GW Dunlap, PM Chen
USENIX Annual Technical Conference, General Track, 71-84, 2003
5152003
Debugging operating systems with time-traveling virtual machines
ST King, GW Dunlap, PM Chen
Proceedings of the 2005 USENIX Technical Conference, 1-15, 2005
5052005
Designing and Implementing Malicious Hardware.
ST King, JA Tucek, A Cozzie, C Grier, W Jiang, Y Zhou
Leet 8, 1-8, 2008
4542008
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
M Hicks, M Finnicum, ST King, MMK Martin, JM Smith
2010 IEEE symposium on security and privacy, 159-172, 2010
4042010
Detecting past and present intrusions through vulnerability-specific predicates
A Joshi, ST King, GW Dunlap, PM Chen
ACM SIGOPS Operating Systems Review 39 (5), 91-104, 2005
3992005
Secure web browsing with the OP web browser
C Grier, S Tang, ST King
2008 IEEE Symposium on Security and Privacy (sp 2008), 402-416, 2008
2672008
The Multi-Principal OS Construction of the Gazelle Web Browser.
HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter
USENIX security symposium 28, 2009
2622009
Vetting browser extensions for security vulnerabilities with vex
S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett
Communications of the ACM 54 (9), 91-99, 2011
2302011
Enriching Intrusion Alerts Through Multi-Host Causality.
ST King, ZM Mao, DG Lucchetti, PM Chen
Ndss, 2005
2132005
Digging for Data Structures.
A Cozzie, F Stratton, H Xue, ST King
OSDI 8, 255-266, 2008
1912008
Backtracking intrusions
ST King, PM Chen
ACM Transactions on Computer Systems (TOCS) 23 (1), 51-76, 2005
1792005
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE symposium on security and privacy, 64-77, 2011
1732011
Capo: a software-hardware interface for practical deterministic multiprocessor replay
P Montesinos, M Hicks, ST King, J Torrellas
Proceedings of the 14th international conference on Architectural support …, 2009
1562009
Mavmm: Lightweight and purpose built vmm for malware analysis
AM Nguyen, N Schear, HD Jung, A Godiyal, ST King, HD Nguyen
2009 Annual Computer Security Applications Conference, 441-450, 2009
1322009
Trust and protection in the illinois browser operating system
S Tang, H Mai, ST King
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
1242010
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
872015
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20