P
Peter M. Chen
Researcher at University of Michigan
Publications - 107
Citations - 12099
Peter M. Chen is an academic researcher from University of Michigan. The author has contributed to research in topics: Disk array & Virtual machine. The author has an hindex of 50, co-authored 107 publications receiving 11669 citations. Previous affiliations of Peter M. Chen include Carnegie Mellon University & VMware.
Papers
More filters
Journal ArticleDOI
RAID: high-performance, reliable secondary storage
TL;DR: A comprehensive overview of disk array technology and implementation topics such as refining the basic RAID levels to improve performance and designing algorithms to maintain data consistency are discussed.
Journal ArticleDOI
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
TL;DR: ReVirt removes the dependency on the target operating system by moving it into a virtual machine and logging below the virtual machine, and enables it to provide arbitrarily detailed observations about what transpired on the system, even in the presence of non-deterministic attacks and executions.
Proceedings ArticleDOI
When virtual is better than real [operating system relocation to virtual machines]
Peter M. Chen,Brian D. Noble +1 more
TL;DR: This paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine, and describes three services that take advantage of this structure: secure logging, intrusion prevention and detection, and environment migration.
Proceedings ArticleDOI
SubVirt: implementing malware with virtual machines
Samuel T. King,Peter M. Chen +1 more
TL;DR: This paper evaluates a new type of malicious software that gains qualitatively more control over a system, which is called a virtual-machine based rootkit (VMBR), and implements a defense strategy suitable for protecting systems against this threat.
Journal ArticleDOI
Backtracking intrusions
Samuel T. King,Peter M. Chen +1 more
TL;DR: The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion to identify files and processes that could have affected that detection point and displays chains of events in a dependency graph.