Back to Results
First PageMeta Content
Object Manager / Malware / Dependency graph / Database / Computing / Software / System software / Unix / Inode / File system


Intrusion Recovery Using Selective Re-execution Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek MIT CSAIL A BSTRACT
Add to Reading List

Document Date: 2010-09-23 11:16:30


Open Document

File Size: 518,11 KB

Share Result on Facebook

Currency

USD / /

IndustryTerm

re-execute existing applications / user-level services / server software / paper review software / backup tools / industrial solutions / anti-virus tools / block devices / recent general solution / paper submission web site / Typical previous solutions / email server / secure computer systems / repair algorithm / generic repair algorithm / web server / conference submission site / /

OperatingSystem

Unix / Linux / Microsoft Windows / /

Organization

ETRO / MIT / /

Person

Eve / R ETRO / Legend / /

/

Position

system administrator / repair manager / manager of each directory inode / actor / exec. / manager / manager intercepts / entire actor / directory manager / system call actor / manager checkpoints actors / OS manager / file manager / manager names / manager This section / file system manager / sethactioni actor / Object manager / botnet worker / Directory manager The directory manager / higher-level manager / Action manager / appropriate manager / process actor / object.writers sethdata objecti data object.parts actor object action.actor / The repair controller / repair controller / administrator / a.actor / Windows Driver / BJECT AND ACTION MANAGERS File system manager The file system manager / separate system call actor / controller / manager API / separate actor / /

ProgrammingLanguage

PHP / /

Technology

virtual machine / PHP / Unix / Linux / API / repair algorithm / operating system / generic repair algorithm / flow control / HTTP / web server / /

SocialTag