Abstract is missing.
- Opening remarksKenneth P. Birman. [doi]
- Keynote speechAndrew S. Tanenbaum. [doi]
- Pioneer: verifying code integrity and enforcing untampered code execution on legacy systemsArvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla. 1-16 [doi]
- Labels and event processes in the Asbestos operating systemPetros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Morris. 17-30 [doi]
- Mondrix: memory isolation for linux using mondriaan memory protectionEmmett Witchel, Junghwan Rhee, Krste Asanovic. 31-44 [doi]
- BAR fault tolerance for cooperative servicesAmitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Jean-Philippe Martin, Carl Porth. 45-58 [doi]
- Fault-scalable Byzantine fault-tolerant servicesMichael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie. 59-74 [doi]
- Implementing declarative overlaysBoon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica. 75-90 [doi]
- Detecting past and present intrusions through vulnerability-specific predicatesAshlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen. 91-104 [doi]
- Capturing, indexing, clustering, and retrieving system historyIra Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox. 105-118 [doi]
- Connections: using context to enhance file searchCraig A. N. Soules, Gregory R. Ganger. 119-132 [doi]
- Vigilante: end-to-end containment of internet wormsManuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham. 133-147 [doi]
- Scalability, fidelity, and containment in the potemkin virtual honeyfarmMichael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. 148-162 [doi]
- The taser intrusion recovery systemAshvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, Eyal de Lara. 163-176 [doi]
- Hibernator: helping disk arrays sleep through the winterQingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes. 177-190 [doi]
- Speculative execution in a distributed file systemEdmund B. Nightingale, Peter M. Chen, Jason Flinn. 191-205 [doi]
- IRON file systemsVijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 206-220 [doi]
- RaceTrack: efficient detection of data race conditions via adaptive trackingYuan Yu, Tom Rodeheffer, Wei Chen. 221-234 [doi]
- Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, Joseph Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou. 235-248 [doi]
- Idletime scheduling with preemption intervalsLars Eggert, Joseph D. Touch. 249-262 [doi]
- FS2: dynamic data replication in free disk space for improving disk performance and energy consumptionHai Huang, Wanda Hung, Kang G. Shin. 263-276 [doi]
- THINC: a virtual display architecture for thin-client computingRicardo A. Baratto, Leonard N. Kim, Jason Nieh. 277-290 [doi]