Skip to content
Permalink
be20fa50ee
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
741 lines (659 sloc) 24.1 KB
@INPROCEEDINGS{sara,
author={Tehranipoor, F. and Yan, W. and Chandy, J.},
booktitle={Hardware-Oriented Security and Trust (HOST), 2016 IEEE International Symposium on},
title={Robust Hardware True Random Number Generators using DRAM Remanence Effects},
year={2016}
}
@inproceedings{tehranipoor2015dram,
title="{DRAM} based intrinsic physical unclonable functions for system level security",
author={Tehranipoor, Fatemeh and Karimina, Nima and Xiao, Kan and Chandy, John},
booktitle={Proceedings of the 25th edition on Great Lakes Symposium on VLSI},
pages={15--20},
year={2015},
organization={ACM}
}
@inproceedings{karimian2015genetic,
title={Genetic algorithm for hardware Trojan detection with ring oscillator network (RON)},
author={Karimian, Nima and Tehranipoor, Fatemeh and Rahman, Md Tauhidur and Kelly, Shane and Forte, Domenic},
booktitle={Technologies for Homeland Security (HST), 2015 IEEE International Symposium on},
pages={1--6},
year={2015},
organization={IEEE}
}
@inproceedings{yan2015novel,
title={A Novel Way to Authenticate Untrusted Integrated Circuits},
author={Yan, Wei and Tehranipoor, Fatemeh and Chandy, John A},
booktitle={Proceedings of the IEEE/ACM International Conference on Computer-Aided Design},
pages={132--138},
year={2015},
organization={IEEE Press}
}
@article{sangiovanni2002defining,
title={Defining platform-based design},
author={Sangiovanni-Vincentelli, Alberto},
journal={EEDesign of EETimes},
year={2002}
}
@article{schaumont2005platform,
title={Platform-based design for an embedded-fingerprint-authentication device},
author={Schaumont, Patrick and Hwang, David and Verbauwhede, Ingrid},
journal={Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on},
volume={24},
number={12},
pages={1929--1936},
year={2005},
publisher={IEEE}
}
@techreport{benzel2005design,
title={Design principles for security},
author={Benzel, Terry V and Irvine, Cynthia E and Levin, Timothy E and Bhaskara, Ganesha and Nguyen, Thuy D and Clark, Paul C},
year={2005},
institution={DTIC Document}
}
@article{avivzienis2004basic,
title={Basic concepts and taxonomy of dependable and secure computing},
author={Avi{\v{z}}ienis, Algirdas and Laprie, Jean-Claude and Randell, Brian and Landwehr, Carl},
journal={Dependable and Secure Computing, IEEE Transactions on},
volume={1},
number={1},
pages={11--33},
year={2004},
publisher={IEEE}
}
@article{sangiovanni2007quo,
title="Quo vadis, {SLD? Reasoning} about the trends and challenges of system level design",
author={Sangiovanni-Vincentelli, Alberto},
journal={Proceedings of the IEEE},
volume={95},
number={3},
pages={467--506},
year={2007},
publisher={IEEE}
}
@inproceedings{densmore2009platform,
title={A platform-based design environment for synthetic biological systems},
author={Densmore, Douglas and Van Devender, Anne and Johnson, Matthew and Sritanyaratana, Nade},
booktitle={The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations},
pages={24--29},
year={2009},
organization={ACM}
}
@article{teich2012hardware,
title={Hardware/software codesign: The past, the present, and predicting the future},
author={Teich, J{\"u}rgen},
journal={Proceedings of the IEEE},
volume={100},
number={Special Centennial Issue},
pages={1411--1430},
year={2012},
publisher={IEEE}
}
@article{keutzer2000system,
title={System-level design: orthogonalization of concerns and platform-based design},
author={Keutzer, Kurt and Rabaey, Jan M and Sangiovanni-Vincentelli, A and others},
journal={Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on},
volume={19},
number={12},
pages={1523--1543},
year={2000},
publisher={IEEE}
}
@inproceedings{lin2013security,
title="Security-aware mapping for {CAN}-based real-time distributed automotive systems",
author={Lin, Chung-Wei and Zhu, Qi and Phung, Congchi and Sangiovanni-Vincentelli, Alberto},
booktitle={Computer-Aided Design (ICCAD), 2013 IEEE/ACM International Conference on},
pages={115--121},
year={2013},
organization={IEEE}
}
@article{gerstlauer2009electronic,
title={Electronic system-level synthesis methodologies},
author={Gerstlauer, Andreas and Haubelt, Christian and Pimentel, Andy D and Stefanov, Todor P and Gajski, Daniel D and Teich, J{\"u}rgen},
journal={Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on},
volume={28},
number={10},
pages={1517--1530},
year={2009},
publisher={IEEE}
}
@inproceedings{gronbaek2008architecture,
title="Architecture for the {Internet of Things (IoT): API} and interconnect",
author={Gronbaek, I},
booktitle={Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Conference on},
pages={802--807},
year={2008},
organization={IEEE}
}
@article{pimentel2006systematic,
title={A systematic approach to exploring embedded system architectures at multiple abstraction levels},
author={Pimentel, Andy D and Erbas, Cagkan and Polstra, Simon},
journal={Computers, IEEE Transactions on},
volume={55},
number={2},
pages={99--112},
year={2006},
publisher={IEEE}
}
@phdthesis{sedcole2006reconfigurable,
title={Reconfigurable platform-based design in FPGAs for video image processing},
author={Sedcole, Nicholas Peter},
year={2006},
school={Department of Electrical and Electronic Engineering, Imperial College}
}
@techreport{benveniste2012contracts,
title={Contracts for system design},
author={Benveniste, Albert and Caillaud, Beno{\^\i}t and Nickovic, Dejan and Passerone, Roberto and Raclet, Jean-Baptiste and Reinkemeier, Philipp and Sangiovanni-Vincentelli, Alberto and Damm, Werner and Henzinger, Thomas and Larsen, Kim G},
number="RR-8147",
institution="INRIA",
year={2012}
}
@article{pinto2004system,
title={System level design paradigms: Platform-based design and communication synthesis},
author={Pinto, Alessandro and Bonivento, Alvise and Sangiovanni-Vincentelli, Alberto L and Passerone, Roberto and Sgroi, Marco},
journal={ACM Transactions on Design Automation of Electronic Systems (TODAES)},
volume={11},
number={3},
pages={537--563},
year={2004},
organization={ACM}
}
@article{bonivento2006platform,
title={Platform based design for wireless sensor networks},
author={Bonivento, Alvise and Carloni, Luca P and Sangiovanni-Vincentelli, Alberto},
journal={Mobile Networks and Applications},
volume={11},
number={4},
pages={469--485},
year={2006},
publisher={Springer-Verlag New York, Inc.}
}
@inproceedings{pellizzoni2009handling,
title={Handling mixed-criticality in SoC-based real-time embedded systems},
author={Pellizzoni, Rodolfo and Meredith, Patrick and Nam, Min-Young and Sun, Mu and Caccamo, Marco and Sha, Lui},
booktitle={Proceedings of the seventh ACM International Conference on Embedded software},
pages={235--244},
year={2009},
organization={ACM}
}
@article{kreku2008combining,
title="Combining {UML2} application and {SystemC} platform modelling for performance evaluation of real-time embedded systems",
author={Kreku, Jari and Hoppari, Mika and Kestil{\"a}, Tuomo and Qu, Yang and Soininen, Juha-Pekka and Andersson, Per and Tiensyrj{\"a}, Kari},
journal={EURASIP Journal on Embedded Systems},
volume={2008},
number={1},
pages={1--18},
year={2008},
publisher={Springer}
}
@article{gamatie2011model,
title={A model-driven design framework for massively parallel embedded systems},
author={Gamati{\'e}, Abdoulaye and Le Beux, S{\'e}bastien and Piel, {\'E}ric and Ben Atitallah, Rabie and Etien, Anne and Marquet, Philippe and Dekeyser, Jean-Luc},
journal={ACM Transactions on Embedded Computing Systems (TECS)},
volume={10},
number={4},
pages={39},
year={2011},
publisher={ACM}
}
@article{gruttner2013complex,
title="The {COMPLEX} reference framework for {HW/SW} co-design and power management supporting platform-based design-space exploration",
author={Gr{\"u}ttner, Kim and Hartmann, Philipp A and Hylla, Kai and Rosinger, Sven and Nebel, Wolfgang and Herrera, Fernando and Villar, Eugenio and Brandolese, Carlo and Fornaciari, William and Palermo, Gianluca and others},
journal={Microprocessors and Microsystems},
volume={37},
number={8},
pages={966--980},
year={2013},
publisher={Elsevier}
}
@phdthesis{lin2015security,
title={Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems},
author={Lin, Chung-Wei},
school={University of California, Berkeley},
year={2015}
}
@inproceedings{danger2009overview,
title={Overview of Dual rail with Precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors},
author={Danger, Jean-Luc and Guilley, Sylvain and Bhasin, Shivam and Nassar, Maxime and Sauvage, Laurent},
booktitle = {Proceedings of International Confereonce on Signals, Circuits and Systems},
year={2009}
}
@techreport{ellison2015extending,
title="Extending {AADL} for Security Design Assurance of Cyber-Physical Systems",
author={Ellison, Robert and Householder, Allen and Hudak, John and Kazman, Rick and Woody, Carol},
number={CMU/SEI-2015-TR-014},
institution="Software Engineering Institute",
year={2015}
}
@techreport{CommonCriteria,
title={Common Criteria for Information Technology Security Evaluation},
institution={ISO/IEC},
number={ISO/IEC 15408},
month={July},
year={2015}
}
@misc{ThomasNoll,
author="Thomas Noll",
title="{D-MILS and MILS-AADL}",
howpublished="AADL Standards Meeting",
month=jan,
year="2016"
}
@misc{SecurityInAADL,
author="Julien Delange",
title="Improving System and Software Security with {AADL}",
url="https://insights.sei.cmu.edu/sei_blog/2016/02/improving-system-and-software-security-with-aadl.html",
month=feb,
year="2016"
}
@misc{jeepHack,
author="Alex Drozhzhin",
title="{Black Hat USA} 2015: The full story of how that {Jeep} was hacked",
howpublished="https://blog.kaspersky.com/blackhat-jeep -cherokee-hack-explained/9493/",
month=aug,
year="2015"
}
@misc{planeHack,
author="Kim Zetter",
title="Feds say that banned researcher commandeered a plane",
url="http://www.wired.com/2015/05/feds-say-banned-researcher-commandeered-plane/",
month=may,
year="2015"
}
@misc{superFish,
author="Paco Hope",
title="Superfish adware weakens security and injects ads on some {Lenovo} laptops",
howpublished="http://www.techrepublic.com/article/superfish-adware-weakens-security-and-injects-ads-on-some-lenovo-laptops/",
month=feb,
year="2015"
}
@misc{lenovoWPBT,
author="James Sanders",
title="Windows and {UEFI} anti-theft mechanism makes systems less secure",
howpublished="http://www.techrepublic.com/article/windows-and -uefi-anti-theft-mechanism-makes-systems-less-secure/",
month=aug,
year="2015"
}
@misc{govHack,
author="Toluse Olorunnipa",
title="Breach of Employee Data Wider Than Initial Report, {U.S.} Says",
howpublished="http://www.bloomberg.com/politics/articles/2015-06-12/white-house-says-personnel-records-possibly-breached-twice",
month=jun,
year="2015"
}
@misc{stageFright,
author="Steven J. Vaughan-Nicholas",
title="Stagefright: Just how scary is it for {Android} users?",
howpublished="http://www.zdnet.com/article/stagefright-just-how-scary-is-it-for-android-users/",
month=jul,
year="2015"
}
@misc{stageFright2,
author="Zack Whittaker",
title="Stagefright is back, and affecting millions of {Android} devices",
howpublished="http://www.zdnet.com/article/new-stagefright-2-0-flaws-affect-millions-of-android-devices/",
month=oct,
year="2015"
}
@misc{androidUpdates,
author="Kevin Tofel",
title="{HTC} says monthly {Android} security updates are {``unrealistic''}",
howpublished="http://www.zdnet.com/article/htc-says-monthly-stagefright-android-security-updates-are-unrealistic/",
month=oct,
year="2015"
}
@misc{androidMarshmallow,
author="Jack Wallen",
title="The woes of {Android} updates, and how to fix the process",
howpublished="http://www.techrepublic.com/article/the-woes-of-android-updates-and-how-to-fix-the-process/",
month=nov,
year="2015"
}
@misc{googleAndroid,
author="James Sanders",
title="Google finally doubles down on security with monthly {Android} updates",
howpublished="http://www.techrepublic.com/article/google-and-some -android-phone-vendors-introduce-welcome-changes-to-security-update-process/",
month=aug,
year="2015"
}
@article{denning1996location,
title={Location-based authentication: Grounding cyberspace for better security},
author={Denning, Dorothy E and MacDoran, Peter F},
journal={Computer Fraud \& Security},
volume={1996},
number={2},
pages={12--16},
year={1996},
publisher={Elsevier}
}
@article{mapayi2013evaluating,
title={Evaluating usability factors in different authentication methods using artificial neural network},
author={Mapayi, T and Olaniyan, O and Isamotu, N and Moses, O},
journal={African Journal of Computing \& ICT},
volume={6},
number={1},
pages={69--78},
year={2013},
publisher={Citeseer}
}
@article{shi2013new,
title={A new user authentication protocol for wireless sensor networks using elliptic curves cryptography},
author={Shi, Wenbo and Gong, Peng},
journal={International Journal of Distributed Sensor Networks},
volume={2013},
year={2013},
publisher={Hindawi Publishing Corporation}
}
@article{saito2015case,
title={A case-based management system for secure software development using software security knowledge},
author={Saito, Masahito and Hazeyama, Atsuo and Yoshioka, Nobukazu and Kobashi, Takanori and Washizaki, Hironori and Kaiya, Haruhiko and Ohkubo, Takao},
journal={Procedia Computer Science},
volume={60},
pages={1092--1100},
year={2015},
publisher={Elsevier}
}
@article{son2015software,
title={A Software Weakness Analysis Technique for Secure Software},
author={Son, Yunsik and Lee, Yangsun and Oh, Seman},
journal={Advanced Science and Technology Letters},
volume={93},
pages={5--8},
year={2015}
}
@article{denning2015toward,
title={Toward more secure software},
author={Denning, Dorothy E},
journal={Communications of the ACM},
volume={58},
number={4},
pages={24--26},
year={2015},
publisher={ACM}
}
@phdthesis{nguyen2015model,
title={Model-Driven Security With Modularity and Reusability For Engineering Secure Software Systems},
author={Nguyen, Phu},
year={2015},
school={University of Luxembourg}
}
@article{ravi2004security,
title={Security in embedded systems: Design challenges},
author={Ravi, Srivaths and Raghunathan, Anand and Kocher, Paul and Hattangady, Sunil},
journal={ACM Transactions on Embedded Computing Systems (TECS)},
volume={3},
number={3},
pages={461--491},
year={2004},
publisher={ACM}
}
@article{gokhale2008model,
title={Model driven middleware: A new paradigm for developing distributed real-time and embedded systems},
author={Gokhale, Aniruddha and Balasubramanian, Krishnakumar and Krishna, Arvind S and Balasubramanian, Jaiganesh and Edwards, George and Deng, Gan and Turkay, Emre and Parsons, Jeffrey and Schmidt, Douglas C},
journal={Science of Computer programming},
volume={73},
number={1},
pages={39--58},
year={2008},
publisher={Elsevier}
}
@article{aaraj2008analysis,
title={Analysis and design of a hardware/software trusted platform module for embedded systems},
author={Aaraj, Najwa and Raghunathan, Anand and Jha, Niraj K},
journal={ACM Transactions on Embedded Computing Systems (TECS)},
volume={8},
number={1},
pages={8},
year={2008},
publisher={ACM}
}
@inproceedings{perez2006vtpm,
title={vTPM: virtualizing the trusted platform module},
author={Perez, Ronald and Sailer, Reiner and van Doorn, Leendert and others},
booktitle={Proc. 15th Conf. on USENIX Security Symposium},
pages={305--320},
year={2006}
}
% ----------- New Sources for the Tracking paper --------------------------
@misc{ntopWebsite,
title="ntop - High Performance Network Monitoring Solutions",
url="http://www.ntop.org/",
}
@misc{pfringWebsite,
title="{PF\_RING} - High-speed packet capture, filtering and analysis",
url="http://www.ntop.org/products/packet-capture/pf_ring/",
}
@misc{PFRINGMan,
title="{PF\_RING} User Guide",
url="https://svn.ntop.org/svn/ntop/trunk/PF_RING/doc/UsersGuide.pdf",
}
@misc{dataseriesGit,
title="DataSeries: structured serial data library",
url="https://github.com/dataseries/DataSeries",
}
@techreport{DataSeries,
Author = {Eric Anderson and Martin Arlitt and Morrey III, Charles B. and Alistair Veitch},
Institution = {Hewlett-Packard},
Month = "Sept.",
Number = {HPL-2009-323},
Title = {DataSeries: An Efficient, Flexible Data Format for Structured Serial Data},
Type = {Technical Report},
Year = 2009}
@misc{pandasPythonWebsite,
title="pandas: Python Data Analysis Library",
url="http://pandas.pydata.org/",
}
@inproceedings{leung2008measurement,
title={Measurement and Analysis of Large-Scale Network File System Workloads},
author={Leung, Andrew W and Pasupathy, Shankar and Goodson, Garth R and Miller, Ethan L},
booktitle={USENIX Annual Technical Conference},
pages={213--226},
year={2008}
}
@inproceedings{anderson2004buttress,
title={Buttress: A toolkit for flexible and high fidelity {I/O} benchmarking},
author={Anderson, Eric and Kallahalla, Mahesh and Uysal, Mustafa and Swaminathan, Ram},
booktitle={Proceedings of the 3rd USENIX Conference on File and Storage Technologies},
pages={4--4},
year={2004},
organization={USENIX Association}
}
@inproceedings{Orosz2013,
title={Multi-threaded Packet Timestamping for End-to-End {QoS} Evaluation},
author={Orosz, Peter and Skopko, Tamas},
booktitle={ICSNC 2013, The Eighth International Conference on Systems and Networks Communications},
year={2013}
}
@inproceedings{dabir2007bottleneck,
title="Bottleneck analysis of traffic monitoring using {Wireshark}",
author={Dabir, Abes and Matrawy, Ashraf},
booktitle={Innovations in Information Technology, 2007. IIT'07. 4th International Conference on},
pages={158--162},
year={2007},
organization={IEEE}
}
@inproceedings{narayan2010characterization,
title={I/O characterization on a parallel file system},
author={Narayan, Sumit and Chandy, John A},
booktitle={Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2010 International Symposium on},
pages={133--140},
year={2010},
organization={IEEE}
}
@article{skopko2012loss,
title={Loss analysis of the software-based packet capturing},
author={Skopk{\'o}, Tam{\'a}s},
journal={Carpathian Journal of Electronic and Computer Engineering},
volume={5},
pages={107},
year={2012},
publisher={North University of Baia Mare}
}
@inproceedings{seltzer2003nfs,
title="{NFS} Tricks and Benchmarking Traps",
author={Seltzer, Margo and Ellard, Daniel},
booktitle={Proceedings of the FREENIX track, USENIX Annual Technical Conference},
year={2003},
publisher={USENIX Association}
}
@inproceedings{malkani2003passive,
title={Passive {NFS} tracing of email and research workloads},
author={Malkani, Pia and Ellard, Daniel and Ledlie, Jonathan and Seltzer, Margo},
booktitle={Proceedings of the USENIX Conference on File and Storage Technologies},
month="March",
pages={203-Ð216},
year={2003},
publisher={USENIX Association}
}
@article{ellard2003passive,
title={Passive {NFS} tracing of email and research workloads},
author={Ellard, Daniel and Ledlie, Jonathan and Malkani, Pia and Seltzer, Margo},
journal={Proceedings of the {USENIX} Conference on File and Storage Technologies},
month="March",
pages={203-Ð216},
year={2003},
publisher={USENIX Association}
}
@inproceedings{vogels1999file,
title="File system usage in {Windows NT 4.0}",
author={Vogels, Werner},
booktitle={ACM SIGOPS Operating Systems Review},
volume={33},
number={5},
pages={93--109},
year={1999},
organization={ACM}
}
@article{traeger2008nine,
title={A nine year study of file system and storage benchmarking},
author={Traeger, Avishay and Zadok, Erez and Joukov, Nikolai and Wright, Charles P},
journal={ACM Transactions on Storage (TOS)},
volume={4},
number={2},
pages={5},
year={2008},
publisher={ACM}
}
@book{ruemmler1992unix,
title={UNIX disk access patterns},
author={Ruemmler, Chris and Wilkes, John},
year={1992},
publisher={Hewlett-Packard Laboratories}
}
@inproceedings{roselli2000comparison,
title={A Comparison of File System Workloads.},
author={Roselli, Drew S and Lorch, Jacob R and Anderson, Thomas E},
booktitle={USENIX Annual Technical Conference},
pages={41--54},
year={2000}
}
@article{douceur1999large,
title={A large-scale study of file-system contents},
author={Douceur, John R and Bolosky, William J},
journal={ACM SIGMETRICS Performance Evaluation Review},
volume={27},
number={1},
pages={59--70},
year={1999},
publisher={ACM}
}
% Source for the Table of past examinations
@article{agrawal2007five,
title={A five-year study of file-system metadata},
author={Agrawal, Nitin and Bolosky, William J and Douceur, John R and Lorch, Jacob R},
journal={ACM Transactions on Storage (TOS)},
volume={3},
number={3},
pages={9},
year={2007},
publisher={ACM}
}
@article{baker1991measurements,
title={Measurements of a distributed file system},
author={Baker, Mary G and Hartman, John H and Kupfer, Michael D and Shirriff, Ken W and Ousterhout, John K},
journal={ACM SIGOPS Operating Systems Review},
volume={25},
number={5},
pages={198--212},
year={1991},
organization={ACM}
}
@article{gribble1998self,
title={Self-similarity in file systems},
author={Gribble, Steven D and Manku, Gurmeet Singh and Roselli, Drew and Brewer, Eric A and Gibson, Timothy J and Miller, Ethan L},
journal={ACM SIGMETRICS Performance Evaluation Review},
volume={26},
number={1},
pages={141--150},
year={1998},
publisher={ACM New York, NY, USA}
}
@article{ousterhout1985trace,
title={A trace-driven analysis of the {UNIX 4.2 BSD} file system},
author={Ousterhout, John K and Da Costa, Herve and Harrison, David and Kunze, John A and Kupfer, Mike and Thompson, James G},
journal={ACM SIGOPS Operating Systems Review},
volume={19},
number={5},
month="Dec.",
year={1985},
publisher={ACM}
}
@inproceedings{ramakrishnan1992analysis,
title={Analysis of file {I/O} traces in commercial computing environments},
author={Ramakrishnan, KK and Biswas, Prabuddha and Karedla, Ramakrishna},
booktitle={ACM SIGMETRICS Performance Evaluation Review},
volume={20},
number={1},
pages={78--90},
year={1992},
organization={ACM}
}
@inproceedings{zhou1999analysis,
title={Analysis of personal computer workloads},
author={Zhou, Min and Smith, Alan Jay},
booktitle={Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 1999. Proceedings. 7th International Symposium on},
pages={208--217},
year={1999},
organization={IEEE}
}
@article{vrable2009cumulus,
title={Cumulus: Filesystem backup to the cloud},
author={Vrable, Michael and Savage, Stefan and Voelker, Geoffrey M},
journal={ACM Transactions on Storage (TOS)},
volume={5},
number={4},
pages={14},
year={2009},
publisher={ACM}
}
@inproceedings{benson2010network,
title={Network traffic characteristics of data centers in the wild},
author={Benson, Theophilus and Akella, Aditya and Maltz, David A},
booktitle={Proceedings of the 10th ACM SIGCOMM conference on Internet measurement},
pages={267--280},
year={2010},
organization={ACM}
}
@article{chen2012interactive,
title={Interactive analytical processing in big data systems: A cross-industry study of mapreduce workloads},
author={Chen, Yanpei and Alspaugh, Sara and Katz, Randy},
journal={Proceedings of the VLDB Endowment},
volume={5},
number={12},
pages={1802--1813},
year={2012},
publisher={VLDB Endowment}
}
@misc{SMB1Spec,
author="{Microsoft Corporation}",
title="[{MS-SMB}]: Server Message Block ({SMB}) Protocol",
url="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-smb/f210069c-7086-4dc2-885e-861d837df688",
month=sep,
year="2018"
}
@misc{SMB2Spec,
author="{Microsoft Corporation}",
title="[{MS-SMB2}]: Server Message Block ({SMB}) Protocol Versions 2 and 3",
url="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-smb2/5606ad47-5ee0-437a-817e-70c366052962",
month=sep,
year="2019"
}