{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:32Z","timestamp":1772163992486,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1145\/1346281.1346306","type":"proceedings-article","created":{"date-parts":[[2008,3,12]],"date-time":"2008-03-12T18:35:48Z","timestamp":1205346948000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Hardware counter driven on-the-fly request signatures"],"prefix":"10.1145","author":[{"given":"Kai","family":"Shen","sequence":"first","affiliation":[{"name":"University of Rochester, Rochester, NY"}]},{"given":"Ming","family":"Zhong","sequence":"additional","affiliation":[{"name":"University of Rochester, Rochester, NY"}]},{"given":"Sandhya","family":"Dwarkadas","sequence":"additional","affiliation":[{"name":"University of Rochester, Rochester, NY"}]},{"given":"Chuanpeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Rochester, Rochester, NY"}]},{"given":"Christopher","family":"Stewart","sequence":"additional","affiliation":[{"name":"University of Rochester, Rochester, NY"}]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Rochester, Rochester, NY"}]}],"member":"320","published-online":{"date-parts":[[2008,3]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265925"},{"key":"e_1_3_2_2_3_1","volume-title":"Advanced SQL Injection in SQL Server Applications. Technical report","author":"Anley C.","year":"2002","unstructured":"C. Anley . Advanced SQL Injection in SQL Server Applications. Technical report , Next Generation Security Software Ltd ., 2002 . C. Anley. Advanced SQL Injection in SQL Server Applications. Technical report, Next Generation Security Software Ltd., 2002."},{"key":"e_1_3_2_2_4_1","unstructured":"Ask.com Search Engine (formerly Ask Jeeves). http:\/\/www.ask.com.  Ask.com Search Engine (formerly Ask Jeeves). http:\/\/www.ask.com."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1088149.1088163"},{"key":"e_1_3_2_2_6_1","first-page":"45","volume-title":"Proc. of the Third USENIX Symp. on Operating Systems Design and Implementation","author":"Banga G.","year":"1999","unstructured":"G. Banga , P. Druschel , and J.C. Mogul . Resource Containers: A New Facility for Resource Management in Server Systems . In Proc. of the Third USENIX Symp. on Operating Systems Design and Implementation , pages 45 -- 58 , New Orleans, LA , February 1999 . G. Banga, P. Druschel, and J.C. Mogul. Resource Containers: A New Facility for Resource Management in Server Systems. In Proc. of the Third USENIX Symp. on Operating Systems Design and Implementation, pages 45--58, New Orleans, LA, February 1999."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/378420.378792"},{"key":"e_1_3_2_2_8_1","first-page":"259","volume-title":"Proc. of the 6th USENIX Symp. on Operating Systems Design and Implementation","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for Request Extraction and Workload Modeling . In Proc. of the 6th USENIX Symp. on Operating Systems Design and Implementation , pages 259 -- 272 , San Francisco, CA , December 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for Request Extraction and Workload Modeling. In Proc. of the 6th USENIX Symp. on Operating Systems Design and Implementation, pages 259--272, San Francisco, CA, December 2004."},{"key":"e_1_3_2_2_9_1","first-page":"159","volume-title":"Proc. of the Second USENIX Symp. on Networked Systems Design and Implementation","author":"Blanquer J.M.","year":"2005","unstructured":"J.M. Blanquer , A. Batchelli , K. Schauser , and R. Wolski . Quorum: Flexible Quality of Service for Internet Services . In Proc. of the Second USENIX Symp. on Networked Systems Design and Implementation , pages 159 -- 174 , Boston, MA , May 2005 . J.M. Blanquer, A. Batchelli, K. Schauser, and R. Wolski. Quorum: Flexible Quality of Service for Internet Services. In Proc. of the Second USENIX Symp. on Networked Systems Design and Implementation, pages 159--174, Boston, MA, May 2005."},{"key":"e_1_3_2_2_10_1","first-page":"103","volume-title":"Proc. of the USENIX Annual Technical Conf.","author":"Bulpin J.B.","year":"2005","unstructured":"J.B. Bulpin and I.A. Pratt . Hyper-Threading Aware Process Scheduling Heuristics . In Proc. of the USENIX Annual Technical Conf. , pages 103 -- 106 , Anaheim, CA , April 2005 . J.B. Bulpin and I.A. Pratt. Hyper-Threading Aware Process Scheduling Heuristics. In Proc. of the USENIX Annual Technical Conf., pages 103--106, Anaheim, CA, April 2005."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502045"},{"key":"e_1_3_2_2_12_1","first-page":"309","volume-title":"Proc. of the First USENIX Symp. on Networked Systems Design and Implementation","author":"Chen M.","year":"2004","unstructured":"M. Chen , A. Accardi , E. Kiciman , J. Lloyd , D. Patterson , A. Fox , and E. Brewer . Path-Based Failure and Evolution Management . In Proc. of the First USENIX Symp. on Networked Systems Design and Implementation , pages 309 -- 322 , San Francisco, CA , March 2004 . M. Chen, A. Accardi, E. Kiciman, J. Lloyd, D. Patterson, A. Fox, and E. Brewer. Path-Based Failure and Evolution Management. In Proc. of the First USENIX Symp. on Networked Systems Design and Implementation, pages 309--322, San Francisco, CA, March 2004."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/545215.545241"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/942806.943853"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/645989.674311"},{"key":"e_1_3_2_2_17_1","first-page":"395","volume-title":"Proc. of the 6th USENIX Symp. on Operating Systems Design and Implementation","author":"Gniady C.","year":"2004","unstructured":"C. Gniady , A.R. Butt , and Y.C. Hu . Program-Counter-Based Pattern Classification in Buffer Caching . In Proc. of the 6th USENIX Symp. on Operating Systems Design and Implementation , pages 395 -- 408 , San Francisco, CA , December 2004 . C. Gniady, A.R. Butt, and Y.C. Hu. Program-Counter-Based Pattern Classification in Buffer Caching. In Proc. of the 6th USENIX Symp. on Operating Systems Design and Implementation, pages 395--408, San Francisco, CA, December 2004."},{"key":"e_1_3_2_2_18_1","volume-title":"Int'l Symp. on Secure Software Engineering","author":"Halfond G.J.","year":"2006","unstructured":"W. G.J. Halfond , J. Viegas , and A. Orso . A Classification of SQL Injection Attacks and Countermeasures . In Int'l Symp. on Secure Software Engineering , Arlington , VA , March 2006 . W.G.J. Halfond, J. Viegas, and A. Orso. A Classification of SQL Injection Attacks and Countermeasures. In Int'l Symp. on Secure Software Engineering, Arlington, VA, March 2006."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/762483.762486"},{"key":"e_1_3_2_2_20_1","unstructured":"RUBiS: Rice University Bidding System. http:\/\/rubis.objectweb.org.  RUBiS: Rice University Bidding System. http:\/\/rubis.objectweb.org."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.14.4.670"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060311"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859657"},{"key":"e_1_3_2_2_24_1","first-page":"71","volume-title":"Proc. of the Second USENIX Symp. on Networked Systems Design and Implementation","author":"Stewart C.","year":"2005","unstructured":"C. Stewart and K. Shen . Performance Modeling and System Management for Multi-component Online Services . In Proc. of the Second USENIX Symp. on Networked Systems Design and Implementation , pages 71 -- 84 , Boston, MA , May 2005 . C. Stewart and K. Shen. Performance Modeling and System Management for Multi-component Online Services. In Proc. of the Second USENIX Symp. on Networked Systems Design and Implementation, pages 71--84, Boston, MA, May 2005."},{"key":"e_1_3_2_2_25_1","first-page":"57","volume-title":"Proc. of the Third USENIX Virtual Machine Research and Technology Symp.","author":"Sweeney P.F.","year":"2004","unstructured":"P.F. Sweeney , M. Hauswirth , B. Cahoon , P. Cheng , A. Diwan , D. Grove , and M. Hind . Using Hardware Performance Monitors to Understand the Behaviors of Java Applications . In Proc. of the Third USENIX Virtual Machine Research and Technology Symp. , pages 57 -- 72 , San Jose, CA , May 2004 . P.F. Sweeney, M. Hauswirth, B. Cahoon, P. Cheng, A. Diwan, D. Grove, and M. Hind. Using Hardware Performance Monitors to Understand the Behaviors of Java Applications. In Proc. of the Third USENIX Virtual Machine Research and Technology Symp., pages 57--72, San Jose, CA, May 2004."},{"key":"e_1_3_2_2_26_1","unstructured":"TPC Benchmark C. http:\/\/www.tpc.org\/tpcc.  TPC Benchmark C. http:\/\/www.tpc.org\/tpcc."},{"key":"e_1_3_2_2_27_1","unstructured":"TPC Benchmark H. http:\/\/www.tpc.org\/tpch.  TPC Benchmark H. http:\/\/www.tpc.org\/tpch."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945471"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361397.1361411"}],"event":{"name":"ASPLOS08: Architectural Support for Programming Languages and Operating Systems","location":"Seattle WA USA","acronym":"ASPLOS08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 13th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1346281.1346306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1346281.1346306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:38:57Z","timestamp":1750239537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1346281.1346306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":29,"alternative-id":["10.1145\/1346281.1346306","10.1145\/1346281"],"URL":"https:\/\/doi.org\/10.1145\/1346281.1346306","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1353536.1346306","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1353535.1346306","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1353534.1346306","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"2008-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}