Protecting portable storage with host validation
Abstract
References
Index Terms
- Protecting portable storage with host validation
Recommendations
Storage-Based Intrusion Detection
Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan ...
Rootkit-resistant disks
CCS '08: Proceedings of the 15th ACM conference on Computer and communications securityRootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Suchmalware becomes even more dangerous when it is persistent-infected disk images allow the malware to exist ...
An update-aware storage system for low-locality update-intensive workloads
ASPLOS '12Traditional storage systems provide a simple read/write interface, which is inadequate for low-locality update-intensive workloads because it limits the disk scheduling flexibility and results in inefficient use of buffer memory and raw disk bandwidth. ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Ehab Al-Shaer,
- Program Chairs:
- Angelos D. Keromytis,
- Vitaly Shmatikov
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 343Total Downloads
- Downloads (Last 12 months)7
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in