-
1
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA, ACM Press
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177, New York, NY, USA, 2003. ACM Press.
-
(2003)
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
37149032453
-
-
D. M. Chess and S. R. White. An undetectable computer vims. In Virus Bulletin Conference, Sept. 2002.
-
D. M. Chess and S. R. White. An undetectable computer vims. In Virus Bulletin Conference, Sept. 2002.
-
-
-
-
3
-
-
0023294949
-
Computer viruses: Theory and experiments
-
F. Cohen. Computer viruses: theory and experiments. Comput. Secur., 6(1):22-35, 1987.
-
(1987)
Comput. Secur
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
4
-
-
85084163882
-
Security in Plan 9
-
Berkeley, CA, USA, USENIX Association
-
R. Cox, E. Grosse, R. Pike, D. L. Presotto, and S. Quinlan. Security in Plan 9. In Proceedings of the 11th USENIX Security Symposium, pages 3-16, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 3-16
-
-
Cox, R.1
Grosse, E.2
Pike, R.3
Presotto, D.L.4
Quinlan, S.5
-
5
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA, ACM Press
-
R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security, pages 77-88, New York, NY, USA, 2005. ACM Press.
-
(2005)
SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
6
-
-
37149021012
-
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246, Jan. 1999
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246, Jan. 1999.
-
-
-
-
7
-
-
21644455412
-
Terra: A virtual machinebased platform for trusted computing
-
New York, NY, USA, ACM Press
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machinebased platform for trusted computing. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 193-206, New York, NY, USA, 2003. ACM Press.
-
(2003)
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
85084160875
-
An open-source cryptographic coprocessor
-
Denver, CO, Aug
-
P. Gutmann. An open-source cryptographic coprocessor. In Proc. 9th USENIX Security Symposium, Denver, CO, Aug 2000.
-
(2000)
Proc. 9th USENIX Security Symposium
-
-
Gutmann, P.1
-
11
-
-
37149050166
-
-
Intel. Intel Virtualization Technology Specification for the IA-32 Intel Architecture, 2005.
-
Intel. Intel Virtualization Technology Specification for the IA-32 Intel Architecture, 2005.
-
-
-
-
14
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
June
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. In ISCA '05: Proceedings of the 32nd Annual International Symposium on Computer Architecture, pages 2-13, June 2005.
-
(2005)
ISCA '05: Proceedings of the 32nd Annual International Symposium on Computer Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
15
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pages 168-177, 2000.
-
(2000)
ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
16
-
-
21644454794
-
Open-source applications of TCPA hardware
-
Dec
-
J. Marchesini, S. W. Smith, O. Wild, J. Stabiner, and A. Barsamian. Open-source applications of TCPA hardware. In 20th Annual Computer Security Applications Conference, Dec. 2004.
-
(2004)
20th Annual Computer Security Applications Conference
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Stabiner, J.4
Barsamian, A.5
-
18
-
-
37149007644
-
Device for and method of secure computing using virtual machines
-
U.S. Patent no. 6,922,774, July
-
R. Meushaw, M. Schneider, D. Simard, and G. Wagner. Device for and method of secure computing using virtual machines. U.S. Patent no. 6,922,774, July 2005.
-
(2005)
-
-
Meushaw, R.1
Schneider, M.2
Simard, D.3
Wagner, G.4
-
20
-
-
37149050169
-
Reincarnating PCs with Portable SoulPads
-
23418, IBM Research, June
-
M. T. Raghunath, C. Narayanaswami, C. Carter, and R. Caceres. Reincarnating PCs with Portable SoulPads. Technical Report RC 23418, IBM Research, June 2005.
-
(2005)
Technical Report RC
-
-
Raghunath, M.T.1
Narayanaswami, C.2
Carter, C.3
Caceres, R.4
-
21
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Aug
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proc. 14th USENIX Security Symposium, Aug. 2005.
-
(2005)
Proc. 14th USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
22
-
-
85094675630
-
Virtual appliances for deploying and maintaining software
-
October
-
C. Sapuntzakis, D. Brumley, R. Chandra, N. Zeldovich, J. Chow, M. S. Lam, and M. Rosenblum. Virtual appliances for deploying and maintaining software. In Proceedings of the Seventeenth Large Installation Systems Administration Conference (LISA 2003), October 2003.
-
(2003)
Proceedings of the Seventeenth Large Installation Systems Administration Conference (LISA 2003)
-
-
Sapuntzakis, C.1
Brumley, D.2
Chandra, R.3
Zeldovich, N.4
Chow, J.5
Lam, M.S.6
Rosenblum, M.7
-
23
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Apr
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(9):831-860, Apr. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.9
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
24
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas. Design and implementation of the aegis single-chip secure processor using physical random functions. In ISCA '05: Proceedings of the 32nd Annual International Symposium on Computer Architecture, pages 25-36, 2005.
-
(2005)
ISCA '05: Proceedings of the 32nd Annual International Symposium on Computer Architecture
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
26
-
-
37149030580
-
-
Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 85. http://www.trustedcomputinggroup.org, Feb. 2005.
-
Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 85. http://www.trustedcomputinggroup.org, Feb. 2005.
-
-
-
-
28
-
-
84858491473
-
-
VMware. VMware ACE. http://www.vmware.com/products/desktop/ace-features. html.
-
VMware ACE
-
-
VMware1
|