共 50 条
- [1] Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 762 - 775
- [3] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection [J]. Wireless Personal Communications, 2013, 68 : 1377 - 1391
- [4] Improving the reliability of commodity operating systems [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2005, 23 (01): : 77 - 110
- [5] SoK: Rowhammer on Commodity Operating Systems [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 436 - 452
- [6] Survivability Analysis of VM-Based Intrusion Tolerant Systems [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
- [7] SLIC: An extensibility system for commodity operating systems [J]. PROCEEDINGS OF THE USENIX 1998 ANNUAL TECHNICAL CONFERENCE, 1998, : 39 - 52
- [8] HPMMAP: Lightweight Memory Management for Commodity Operating Systems [J]. 2014 IEEE 28TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM, 2014,
- [9] Disco: Running commodity operating systems on scalable multiprocessors [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1997, 15 (04): : 412 - 447
- [10] CSR: Core Surprise Removal in Commodity Operating Systems [J]. ACM SIGPLAN NOTICES, 2016, 51 (04) : 773 - 787