-
1
-
-
84955621400
-
Tamper resistant software: An implementation
-
First International Workshop on Information Hiding. Anderson R.J. (Ed). Cambridge, U.K., May 30-June 1, 1996, Springer
-
Aucsmith D. Tamper resistant software: An implementation. In: Anderson R.J. (Ed). First International Workshop on Information Hiding. Cambridge, U.K., May 30-June 1, 1996. Lecture Notes in Computer Science vol. 1174 (1996), Springer
-
(1996)
Lecture Notes in Computer Science
, vol.1174
-
-
Aucsmith, D.1
-
2
-
-
1142270162
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
Balacheff B., Chen L., Pearson S., Plaquin D., and Proudler G. Trusted Computing Platforms: TCPA Technology in Context (2002), Prentice Hall PTR, Upper Saddle River, NJ, USA
-
(2002)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
3
-
-
14844295011
-
Direct anonymous attestation
-
Atluri V., Pfitzmann B., and McDaniel P.D. (Eds). CCS 2004, Washington, DC, USA, October 25-29, 2004, ACM
-
Brickell E.F., Camenisch J., and Chen L. Direct anonymous attestation. In: Atluri V., Pfitzmann B., and McDaniel P.D. (Eds). 11th ACM Conference on Computer and Communications Security. CCS 2004, Washington, DC, USA, October 25-29, 2004 (2004), ACM
-
(2004)
11th ACM Conference on Computer and Communications Security
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
4
-
-
47749090850
-
-
M. Ceccato, M.D. Preda, J. Nagra, C. Collberg, P. Tonella, Barrier slicing for remote software trusting, in: 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM'07, September 30-October 1, Paris, France, 2007
-
M. Ceccato, M.D. Preda, J. Nagra, C. Collberg, P. Tonella, Barrier slicing for remote software trusting, in: 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM'07, September 30-October 1, Paris, France, 2007
-
-
-
-
5
-
-
27944437085
-
Virtual leashing: Internet-based software piracy protection
-
ICDCS 2005, 6-10 June 2005, Columbus, OH, USA, IEEE Computer Society
-
Dvir O., Herlihy M., and Shavit N. Virtual leashing: Internet-based software piracy protection. 25th International Conference on Distributed Computing Systems. ICDCS 2005, 6-10 June 2005, Columbus, OH, USA (2005), IEEE Computer Society
-
(2005)
25th International Conference on Distributed Computing Systems
-
-
Dvir, O.1
Herlihy, M.2
Shavit, N.3
-
6
-
-
0042349623
-
A trusted open platform
-
England P., Lampson B.W., Manferdelli J., Peinado M., and Willman B. A trusted open platform. IEEE Computer 36 7 (2003) 55-62
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.W.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
7
-
-
34047170729
-
Software integrity protection using timed executable agents
-
Lin F.-C., Lee D.-T., Lin B.-S., Shieh S., and Jajodia S. (Eds). ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, ACM
-
Garay J.A., and Huelsbergen L. Software integrity protection using timed executable agents. In: Lin F.-C., Lee D.-T., Lin B.-S., Shieh S., and Jajodia S. (Eds). 2006 ACM Symposium on Information, Computer and Communications Security. ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006 (2006), ACM
-
(2006)
2006 ACM Symposium on Information, Computer and Communications Security
-
-
Garay, J.A.1
Huelsbergen, L.2
-
8
-
-
21644455412
-
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, D. Boneh, Terra: A virtual machine-based platform for trusted computing, in: 19th Symposium on Operating System Principles, October 19-22, 2003, Bolton Landing, NY, USA, 2003
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, D. Boneh, Terra: A virtual machine-based platform for trusted computing, in: 19th Symposium on Operating System Principles, October 19-22, 2003, Bolton Landing, NY, USA, 2003
-
-
-
-
9
-
-
33846272389
-
Strengthening software self-checksumming via self-modifying code
-
ACSAC 2005, 5-9 December 2005, Tucson, AZ, USA, IEEE Computer Society
-
Giffin J.T., Christodorescu M., and Kruger L. Strengthening software self-checksumming via self-modifying code. 21st Annual Computer Security Applications Conference. ACSAC 2005, 5-9 December 2005, Tucson, AZ, USA (2005), IEEE Computer Society
-
(2005)
21st Annual Computer Security Applications Conference
-
-
Giffin, J.T.1
Christodorescu, M.2
Kruger, L.3
-
11
-
-
70349659108
-
-
V. Haldar, D. Chandra, M. Franz, Semantic remote attestation - virtual machine directed approach to trusted computing, in: 3rd Virtual Machine Research and Technology Symposium, May 6-7, 2004, San Jose, CA, USA, USENIX, 2004
-
V. Haldar, D. Chandra, M. Franz, Semantic remote attestation - virtual machine directed approach to trusted computing, in: 3rd Virtual Machine Research and Technology Symposium, May 6-7, 2004, San Jose, CA, USA, USENIX, 2004
-
-
-
-
12
-
-
85077706009
-
-
B. Kauer, OSLO: Improving the security of trusted computing, in: 16th USENIX Security Symposium, August 6-10, 2007, Boston, MA, USA, USENIX, 2007
-
B. Kauer, OSLO: Improving the security of trusted computing, in: 16th USENIX Security Symposium, August 6-10, 2007, Boston, MA, USA, USENIX, 2007
-
-
-
-
13
-
-
85028170979
-
-
R. Kennell, L.H. Jamieson, Establishing the genuinity of remote computer systems, in: 12th USENIX Security Symposium, August 4-8, 2003, Washington, DC, USA, USENIX, 2003
-
R. Kennell, L.H. Jamieson, Establishing the genuinity of remote computer systems, in: 12th USENIX Security Symposium, August 4-8, 2003, Washington, DC, USA, USENIX, 2003
-
-
-
-
14
-
-
79959566693
-
Realizing property-based attestation and sealing with commonly available hard- and software
-
STC'07, ACM, New York, NY, USA
-
Kühn U., Selhorst M., and Stüble C. Realizing property-based attestation and sealing with commonly available hard- and software. 2007 ACM Workshop on Scalable Trusted Computing. STC'07 (2007), ACM, New York, NY, USA
-
(2007)
2007 ACM Workshop on Scalable Trusted Computing
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
15
-
-
77952132371
-
-
J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, H. Isozaki, Flicker: An execution infrastructure for TCB minimization, in: ACM European Conference in Computer Systems, EuroSys 2008, 2008
-
J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, H. Isozaki, Flicker: An execution infrastructure for TCB minimization, in: ACM European Conference in Computer Systems, EuroSys 2008, 2008
-
-
-
-
16
-
-
85174664325
-
Distributed execution with remote audit
-
NDSS 1999, San Diego, CA, USA, The Internet Society
-
Monrose F., Wyckoff P., and Rubin A.D. Distributed execution with remote audit. Network and Distributed System Security Symposium. NDSS 1999, San Diego, CA, USA (1999), The Internet Society
-
(1999)
Network and Distributed System Security Symposium
-
-
Monrose, F.1
Wyckoff, P.2
Rubin, A.D.3
-
17
-
-
33646445517
-
NGSCB: A trusted open system
-
9th Australasian Conference on Information Security and Privacy. Wang H., Pieprzyk J., and Varadharajan V. (Eds). ACISP 2004, Sydney, Australia, July 13-15, 2004, Springer
-
Peinado M., Chen Y., England P., and Manferdelli J. NGSCB: A trusted open system. In: Wang H., Pieprzyk J., and Varadharajan V. (Eds). 9th Australasian Conference on Information Security and Privacy. ACISP 2004, Sydney, Australia, July 13-15, 2004. Lecture Notes in Computer Science vol. 3108 (2004), Springer
-
(2004)
Lecture Notes in Computer Science
, vol.3108
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdelli, J.4
-
18
-
-
34547208096
-
TCG inside?: A note on TPM specification compliance
-
STC'06, ACM Press, New York, NY, USA
-
Sadeghi A.-R., Selhorst M., Stüble C., Wachsmann C., and Winandy M. TCG inside?: A note on TPM specification compliance. First ACM Workshop on Scalable Trusted Computing. STC'06 (2006), ACM Press, New York, NY, USA
-
(2006)
First ACM Workshop on Scalable Trusted Computing
-
-
Sadeghi, A.-R.1
Selhorst, M.2
Stüble, C.3
Wachsmann, C.4
Winandy, M.5
-
19
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Hempelmann C., and Raskin V. (Eds). September 20-23, 2004, Nova Scotia, Canada, ACM
-
Sadeghi A.-R., and Stüble C. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: Hempelmann C., and Raskin V. (Eds). New Security Paradigms Workshop 2004. September 20-23, 2004, Nova Scotia, Canada (2004), ACM
-
(2004)
New Security Paradigms Workshop 2004
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
20
-
-
85084162270
-
-
R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
-
R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
-
-
-
-
21
-
-
33748550267
-
Externally verifiable code execution
-
Seshadri A., Luk M., Perrig A., van Doorn L., and Khosla P.K. Externally verifiable code execution. Commununications of the ACM 49 9 (2006) 45-49
-
(2006)
Commununications of the ACM
, vol.49
, Issue.9
, pp. 45-49
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
van Doorn, L.4
Khosla, P.K.5
-
22
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Herbert A., and Birman K.P. (Eds). SOSP 2005, Brighton, UK, October 23-26, 2005, ACM
-
Seshadri A., Luk M., Shi E., Perrig A., van Doorn L., and Khosla P.K. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In: Herbert A., and Birman K.P. (Eds). 20th ACM Symposium on Operating Systems Principles 2005. SOSP 2005, Brighton, UK, October 23-26, 2005 (2005), ACM
-
(2005)
20th ACM Symposium on Operating Systems Principles 2005
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.K.6
-
23
-
-
3042738543
-
SWATT: SoftWare-based ATTestation for embedded devices
-
S&P 2004, 9-12 May 2004, Berkeley, CA, USA, IEEE Computer Society
-
Seshadri A., Perrig A., van Doorn L., and Khosla P.K. SWATT: SoftWare-based ATTestation for embedded devices. 2004 IEEE Symposium on Security and Privacy. S&P 2004, 9-12 May 2004, Berkeley, CA, USA (2004), IEEE Computer Society
-
(2004)
2004 IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.K.4
-
24
-
-
85084162788
-
-
U. Shankar, M. Chew, J.D. Tygar, Side effects are not sufficient to authenticate software, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
-
U. Shankar, M. Chew, J.D. Tygar, Side effects are not sufficient to authenticate software, in: 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, USENIX, 2004
-
-
-
-
25
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
S&P 2005, 8-11 May 2005, Oakland, CA, USA, IEEE Computer Society
-
Shi E., Perrig A., and van Doorn L. BIND: A fine-grained attestation service for secure distributed systems. 2005 IEEE Symposium on Security and Privacy. S&P 2005, 8-11 May 2005, Oakland, CA, USA (2005), IEEE Computer Society
-
(2005)
2005 IEEE Symposium on Security and Privacy
-
-
Shi, E.1
Perrig, A.2
van Doorn, L.3
-
26
-
-
38049096323
-
Delayed and controlled failures in tamper-resistant systems
-
8th Information Hiding
-
Tan G., Chen Y., and Jakubowski M.H. Delayed and controlled failures in tamper-resistant systems. 8th Information Hiding. Lecture Notes in Computer Science, LNCS vol. 4437 (2006)
-
(2006)
Lecture Notes in Computer Science, LNCS
, vol.4437
-
-
Tan, G.1
Chen, Y.2
Jakubowski, M.H.3
-
28
-
-
24344490175
-
A generic attack on checksumming-based software tamper resistance
-
S&P 2005, 8-11 May 2005, Oakland, CA, USA, IEEE Computer Society
-
Wurster G., van Oorschot P.C., and Somayaji A. A generic attack on checksumming-based software tamper resistance. 2005 IEEE Symposium on Security and Privacy. S&P 2005, 8-11 May 2005, Oakland, CA, USA (2005), IEEE Computer Society
-
(2005)
2005 IEEE Symposium on Security and Privacy
-
-
Wurster, G.1
van Oorschot, P.C.2
Somayaji, A.3
-
29
-
-
84943378885
-
Hiding program slices for software security
-
CGO 2003, 23-26 March 2003, San Francisco, CA, USA, IEEE Computer Society
-
Zhang X., and Gupta R. Hiding program slices for software security. 1st IEEE/ACM International Symposium on Code Generation and Optimization. CGO 2003, 23-26 March 2003, San Francisco, CA, USA (2003), IEEE Computer Society
-
(2003)
1st IEEE/ACM International Symposium on Code Generation and Optimization
-
-
Zhang, X.1
Gupta, R.2
|