Sciweavers

93 search results - page 1 / 19
» Ubiquitous Memory Introspection
Sort
View
69
Voted
CGO
2007
IEEE
15 years 5 months ago
Ubiquitous Memory Introspection
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to atta...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
86
Voted
IEEEARES
2009
IEEE
15 years 5 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
89
Voted
MAICS
2003
15 years 9 days ago
Grounded Concept Development Using Introspective Atoms
In this paper we present a system that uses its underlying physiology, a hierarchical memory and a collection of memory management algorithms to learn concepts as cases and to bui...
Eric G. Berkowitz, Brian E. Mastenbrook
93
Voted
CCS
2008
ACM
15 years 28 days ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
69
Voted
PLDI
2009
ACM
15 years 5 months ago
An implementation and semantics for transactional memory introspection in Haskell
Arnar Birgisson, Úlfar Erlingsson