scispace - formally typeset
P

Peter M. Chen

Researcher at University of Michigan

Publications -  107
Citations -  12099

Peter M. Chen is an academic researcher from University of Michigan. The author has contributed to research in topics: Disk array & Virtual machine. The author has an hindex of 50, co-authored 107 publications receiving 11669 citations. Previous affiliations of Peter M. Chen include Carnegie Mellon University & VMware.

Papers
More filters
Journal ArticleDOI

RAID: high-performance, reliable secondary storage

TL;DR: A comprehensive overview of disk array technology and implementation topics such as refining the basic RAID levels to improve performance and designing algorithms to maintain data consistency are discussed.
Journal ArticleDOI

ReVirt: enabling intrusion analysis through virtual-machine logging and replay

TL;DR: ReVirt removes the dependency on the target operating system by moving it into a virtual machine and logging below the virtual machine, and enables it to provide arbitrarily detailed observations about what transpired on the system, even in the presence of non-deterministic attacks and executions.
Proceedings ArticleDOI

When virtual is better than real [operating system relocation to virtual machines]

TL;DR: This paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine, and describes three services that take advantage of this structure: secure logging, intrusion prevention and detection, and environment migration.
Proceedings ArticleDOI

SubVirt: implementing malware with virtual machines

TL;DR: This paper evaluates a new type of malicious software that gains qualitatively more control over a system, which is called a virtual-machine based rootkit (VMBR), and implements a defense strategy suitable for protecting systems against this threat.
Journal ArticleDOI

Backtracking intrusions

TL;DR: The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion to identify files and processes that could have affected that detection point and displays chains of events in a dependency graph.