Cited By
View all- Chen HKim TWang XZeldovich NKaashoek MFlinn JLevy H(2014)Identifying information disclosure in web applications with retroactive auditingProceedings of the 11th USENIX conference on Operating Systems Design and Implementation10.5555/2685048.2685092(555-569)Online publication date: 6-Oct-2014
- Kim TChandra RZeldovich NVahdat AThekkath C(2012)Efficient patch-based auditing for web application vulnerabilitiesProceedings of the 10th USENIX conference on Operating Systems Design and Implementation10.5555/2387880.2387899(193-206)Online publication date: 8-Oct-2012
- Kim TChandra RZeldovich NMoon S(2012)Recovering from intrusions in distributed systems with DAREProceedings of the Third ACM SIGOPS Asia-Pacific conference on Systems10.5555/2387841.2387851(10-10)Online publication date: 23-Jul-2012
- Show More Cited By