-
1
-
-
38349074599
-
-
Intel. Extensible Firmware Interface Specification Version 1.10 (December 2002), http://developer.intel.com/technology/efi/
-
Intel. Extensible Firmware Interface Specification Version 1.10 (December 2002), http://developer.intel.com/technology/efi/
-
-
-
-
3
-
-
38349037773
-
-
Intel. Tiano Architecture Specification Version 0.7 (June 2002), http://www.tianocore.org
-
Intel. Tiano Architecture Specification Version 0.7 (June 2002), http://www.tianocore.org
-
-
-
-
4
-
-
84863309547
-
Attack Trends 2004 and 2005
-
Schneier, B.: Attack Trends 2004 and 2005. ACM Queue 3(5), 52-53 (2005)
-
(2005)
ACM Queue
, vol.3
, Issue.5
, pp. 52-53
-
-
Schneier, B.1
-
6
-
-
85028754690
-
-
Haber, S., Stornetta, W.S.: How To Time-Stamp a Digital Document. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, 537, pp. 437-455. Springer,
-
Haber, S., Stornetta, W.S.: How To Time-Stamp a Digital Document. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 437-455. Springer,
-
-
-
-
7
-
-
38349060287
-
-
Heidelberg 1991
-
Heidelberg (1991)
-
-
-
-
10
-
-
1142280988
-
AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
-
Suh, E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In: ICS. Proceedings of the 17 th International Conference on Supercomputing (2003)
-
(2003)
ICS. Proceedings of the 17 th International Conference on Supercomputing
-
-
Suh, E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
11
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE Press, New York
-
Arbaugh, W., Farber, D.: A secure and reliable bootstrap architecture. In: IEEE Security and Privacy Conference, pp. 65-71. IEEE Press, New York (1997)
-
(1997)
IEEE Security and Privacy Conference
, pp. 65-71
-
-
Arbaugh, W.1
Farber, D.2
-
12
-
-
38349073728
-
-
Intel Trusted Execution Technology Preliminary Architecture Specification November 2006
-
Intel Trusted Execution Technology Preliminary Architecture Specification (November 2006)
-
-
-
-
13
-
-
38349073729
-
-
Intel Centrino Pro and Intel vPro Processor Technolog White Paper
-
Intel Centrino Pro and Intel vPro Processor Technolog White Paper
-
-
-
-
14
-
-
38349062736
-
-
Intel LaGrande Technology Architectural Overview Sepember 2003
-
Intel LaGrande Technology Architectural Overview (Sepember 2003)
-
-
-
-
15
-
-
77955726956
-
ASM Application Security Monitor
-
December
-
Moffie, M., Kaeli, D.: ASM Application Security Monitor. In: WBIA 2005. Special issue on the 2005 workshop on binary instrumentation and application SPECIAL ISSUE, vol. 33(5), pp. 21-26 (December 2005)
-
(2005)
WBIA 2005. Special issue on the 2005 workshop on binary instrumentation and application SPECIAL ISSUE
, vol.33
, Issue.5
, pp. 21-26
-
-
Moffie, M.1
Kaeli, D.2
-
16
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
Chicago, IL, USA June
-
Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, Chicago, IL, USA (June 2005)
-
(2005)
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
18
-
-
85084162735
-
A secure environment for untrusted helper applications
-
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A secure environment for untrusted helper applications. In: Proceedings of the 6th USENIX Security Symposium (July 1996)
-
(1996)
Proceedings of the 6th USENIX Security Symposium (July
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
19
-
-
38349061121
-
-
Garfinkel, T., Rosenblum, M.: A Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proceedings of the Internet Society's 2003 Symposium on Network and Distributed System Security (February 2003)
-
Garfinkel, T., Rosenblum, M.: A Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proceedings of the Internet Society's 2003 Symposium on Network and Distributed System Security (February 2003)
-
-
-
-
20
-
-
21644433634
-
Xen and the art of virtualization
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles (October
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
21
-
-
38349061120
-
-
Microsoft Extensible Firmware Initiative FAT32 File System Specification 1.03
-
Microsoft Extensible Firmware Initiative FAT32 File System Specification 1.03
-
-
-
-
22
-
-
34547204699
-
A New Processor Virtualization Architecture for Security-Oriented Next-Generation Mobile Terminals
-
Inoue, H., Ikeno, A., Kondo, M., Sakai, J., Edahiro, M.: A New Processor Virtualization Architecture for Security-Oriented Next-Generation Mobile Terminals. In: Proceedings of the 43rd annual conference on Design automation table of contents, Annual ACM IEEE Design Automation Conference, pp. 484-489 (2006)
-
(2006)
Proceedings of the 43rd annual conference on Design automation table of contents, Annual ACM IEEE Design Automation Conference
, pp. 484-489
-
-
Inoue, H.1
Ikeno, A.2
Kondo, M.3
Sakai, J.4
Edahiro, M.5
-
24
-
-
33845567238
-
-
Lam, L.C., Li, W., Chiueh, T.-c: Accurate and Automated System Call Policy-Based Intrusion Prevention. In: Dependable Systems and Networks (DSN) International Conference on 2006, pp. 413-424 (October 2006)
-
Lam, L.C., Li, W., Chiueh, T.-c: Accurate and Automated System Call Policy-Based Intrusion Prevention. In: Dependable Systems and Networks (DSN) International Conference on 2006, pp. 413-424 (October 2006)
-
-
-
-
25
-
-
34548147746
-
-
Varghese, Mariam, S., Jacob, K.P.: Process Profiling Using Frequencies of System Calls. In: ARES 2007. Availability, Reliability and Security, 2007. The Second International Conference on 10-13, pp. 473-479 (April 2007)
-
Varghese, Mariam, S., Jacob, K.P.: Process Profiling Using Frequencies of System Calls. In: ARES 2007. Availability, Reliability and Security, 2007. The Second International Conference on 10-13, pp. 473-479 (April 2007)
-
-
-
-
26
-
-
34247271949
-
The Architecture of Host-based Intrusion Detection Model Generation System for the Frequency Per System Call
-
November
-
Paek, S.-H., Oh, Y.-K., Yun, J.B., Lee, D.-H.: The Architecture of Host-based Intrusion Detection Model Generation System for the Frequency Per System Call. In: ICHIT 2006. Hybrid Information Technology, 2006. International Conference, vol. 2, pp. 277-283 (November 2006)
-
(2006)
ICHIT 2006. Hybrid Information Technology, 2006. International Conference
, vol.2
, pp. 277-283
-
-
Paek, S.-H.1
Oh, Y.-K.2
Yun, J.B.3
Lee, D.-H.4
|