-
1
-
-
18844373581
-
Microsoft "Palladium": A Business Overview
-
A. Carroll, M. Juarez, J. Polk, and T. Leininger. Microsoft "Palladium": A Business Overview. Microsoft Content Security Business Unit, August, 2002.
-
(2002)
Microsoft Content Security Business Unit, August
-
-
Carroll, A.1
Juarez, M.2
Polk, J.3
Leininger, T.4
-
4
-
-
4444306353
-
Slicing, chopping, and path conditions with barriers
-
dec
-
J. Krinke. Slicing, chopping, and path conditions with barriers. Software Quality Journal, 12(4):339-360, dec 2004.
-
(2004)
Software Quality Journal
, vol.12
, Issue.4
, pp. 339-360
-
-
Krinke, J.1
-
5
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992.
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
6
-
-
47749129803
-
-
D. of Defense. Trusted computer security evaluation criteria. Washington D.C., December 1985. DOD 5200.28-STD.
-
D. of Defense. Trusted computer security evaluation criteria. Washington D.C., December 1985. DOD 5200.28-STD.
-
-
-
-
8
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. K. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 23-2-6, pages 1-16, 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 23-2-6
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.K.6
-
9
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla. Swatt: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy, pages 272-283, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 272-283
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.K.4
-
10
-
-
47749110027
-
-
M. C. Umesh Shankar and J. D. Tygar. Side effects are not sufficient to authenticate software. Technical Report UCB/CSD-04-1363, EECS Department, University of California, Berkeley, 2004.
-
M. C. Umesh Shankar and J. D. Tygar. Side effects are not sufficient to authenticate software. Technical Report UCB/CSD-04-1363, EECS Department, University of California, Berkeley, 2004.
-
-
-
-
11
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
April-June
-
P. van Oorschot, A. Somayaji, and G. Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. IEEE Transactions on Dependable and Secure Computing, 2(2):82-92, April-June 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 82-92
-
-
van Oorschot, P.1
Somayaji, A.2
Wurster, G.3
-
12
-
-
0003805545
-
-
PhD dissertation, The University of Michigan, Ann Arbor
-
M. D. Weiser. Program Slices: Formal, Psychological, and Practical Investigations of an Automatic Program Abstraction Method. PhD dissertation, The University of Michigan, Ann Arbor, 1979.
-
(1979)
Program Slices: Formal, Psychological, and Practical Investigations of an Automatic Program Abstraction Method
-
-
Weiser, M.D.1
-
13
-
-
84943378885
-
Hiding program slices for software security
-
Washington, DC, USA, IEEE Computer Society
-
X. Zhang and R. Gupta. Hiding program slices for software security. In CGO '03: Proceedings of the international symposium on Code generation and optimization, pages 325-336, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
CGO '03: Proceedings of the international symposium on Code generation and optimization
, pp. 325-336
-
-
Zhang, X.1
Gupta, R.2
|