1 |
http://nvd.nist.gov/home.cfm
|
2 |
W.A. Arbaugh, et al., "Windows of vulnerability: a case study analysis," ,pp. 52-59, Computer, Vol.33, No.12, 2000
|
3 |
G. Altekar, et al., "OPUS: Online Patches and Updates for Security," Proc. USENIX SS, 2005
|
4 |
R. Wahbe, et al., "Efficient software-based fault isolation," ,pp. 203-216, ACM SIGOPS Operating Systems Review, Vol.27, No.5, 1994
DOI
|
5 |
http://www.kb.cert.org/vuls/id/715973
|
6 |
http://support.microsoft.com/kb/819634/en-us
|
7 |
S. Beattie, et al., "Timing the Application of Security Patches for Optimal Uptime," Proceedings of LISA XVI, 2002
|
8 |
Tamches, A. and B.P. Miller, "Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels," , pp. 117-130, Proc. OSDI, 1999
|
9 |
G.C. Necula and P. Lee, "Safe kernel extensions withoutrun-time checking," ,pp. 229- 243, ACM SIGOPS Operating Systems Review, Vol.30, 1996
DOI
|
10 |
D. Gupta, et al., "A formal framework for on- linesoftware version change," ,pp. 120-131, IEEE ToSE, Vol.22, No.2, 1996
|