A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table
Levine, J.G., Grizzard, J.B., Hutto, P.W., Owen, H.L.
Published in IEEE SoutheastCon, 2004. Proceedings (2004)
Published in IEEE SoutheastCon, 2004. Proceedings (2004)
Get full text
Conference Proceeding
Implementing and programming causal distributed shared memory
Ahamad, M., Hutto, P.W., John, R.
Published in [1991] Proceedings. 11th International Conference on Distributed Computing Systems (1991)
Published in [1991] Proceedings. 11th International Conference on Distributed Computing Systems (1991)
Get full text
Conference Proceeding
The architecture of Ra: a kernel for Clouds
Bernabeu-Auban, J.M., Hutto, P.W., Khalidi, M.Y.A., Ahamad, M., Appelbe, W.F., Dagupta, P., LeBlanc, R.J., Ramachandran, U.
Published in [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume II: Software Track (1989)
Published in [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume II: Software Track (1989)
Get full text
Conference Proceeding