-
3
-
-
21644433634
-
Xen and the Art of Virtualization
-
October
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Wareld. Xen and the Art of Virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pages 164-177, October 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Wareld, A.9
-
5
-
-
85059766484
-
Live Migration of Virtual Machines
-
May
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Wareld. Live Migration of Virtual Machines. In Proceedings of the Second Symposium on Networked Systems Design and Implementation, pages 273-286, May 2005.
-
(2005)
Proceedings of the Second Symposium on Networked Systems Design and Implementation
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Wareld, A.8
-
7
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
October
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, S. Smith, L. van Doorn, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 34:57-66, October 2001.
-
(2001)
IEEE Computer
, vol.34
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Smith, S.5
van Doorn, L.6
Weingart, S.7
-
8
-
-
67650023056
-
-
P. Englund, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. IEEE Spectrum, pages 55-62, July 2003.
-
P. Englund, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. IEEE Spectrum, pages 55-62, July 2003.
-
-
-
-
10
-
-
21644455412
-
Terra: A Virtual Machine-Based Platform for Trusted Computing
-
October
-
T. Garnkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pages 193-206, October 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garnkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
11
-
-
85033498470
-
SiRiUS: Securing Remote Untrusted Storage
-
February
-
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing Remote Untrusted Storage. In Proceedings of the Network and Distributed System Security Symposium, pages 131-145, February 2003.
-
(2003)
Proceedings of the Network and Distributed System Security Symposium
, pp. 131-145
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
12
-
-
33947691568
-
The Nizza Secure-System Architecture
-
December
-
H. Ḧ artig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The Nizza Secure-System Architecture. In Proceedings of the International Conference on Collaborative Computing, December 2005.
-
(2005)
Proceedings of the International Conference on Collaborative Computing
-
-
artig, H.H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
15
-
-
84943632039
-
Timing Attacks on Implementations of Dife-Hellman, RSA, DSS, and Other Systems
-
P. Kocher. Timing Attacks on Implementations of Dife-Hellman, RSA, DSS, and Other Systems. In Proceedings of Crypto '96, pages 104-113, 1996.
-
(1996)
Proceedings of Crypto '96
, pp. 104-113
-
-
Kocher, P.1
-
16
-
-
27544511310
-
Architecture for Protecting Critical Secrets in Microprocessors
-
June
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for Protecting Critical Secrets in Microprocessors. In Proceedings of the 32nd International Symposium on Computer Architecture, pages 2-13, June 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
17
-
-
77952379905
-
Secure Untrusted Data Repository (SUNDR)
-
December
-
J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation, pages 121-136, December 2004.
-
(2004)
Proceedings of the Sixth Symposium on Operating Systems Design and Implementation
, pp. 121-136
-
-
Li, J.1
Krohn, M.N.2
Mazières, D.3
Shasha, D.4
-
19
-
-
0034445599
-
Architectural Support for Copy and Tamper Resistant Software
-
November
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 168-177, November 2000.
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
22
-
-
33846483949
-
Intel Virtualization Technology: Hardware Support for Efcient Processor Virtualization
-
August
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel Virtualization Technology: Hardware Support for Efcient Processor Virtualization. Intel Technology Journal, 10(3), August 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
24
-
-
84926427148
-
Survey of Virtual Machine Research
-
June
-
R.P. Goldberg. Survey of Virtual Machine Research. IEEE Computer, 7(6):34-45, June 1974.
-
(1974)
IEEE Computer
, vol.7
, Issue.6
, pp. 34-45
-
-
Goldberg, R.P.1
-
25
-
-
0015315880
-
A Hardware Architecture for Implementing Protection Rings
-
March
-
M. D. Schroeder and J. H. Saltzer. A Hardware Architecture for Implementing Protection Rings. Communications of the ACM, 15(3):157-170, March 1972.
-
(1972)
Communications of the ACM
, vol.15
, Issue.3
, pp. 157-170
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
27
-
-
33748870010
-
InfoShield: A Security Architecture for Protecting Information Usage in Memory
-
February
-
W. Shi, J. B. Fryman, G. Gu, H.-H. Lee, Y. Zhang, and J. Yang. InfoShield: A Security Architecture for Protecting Information Usage in Memory. In Proceedings of the Twelfth International Symposium on High-Performance Computer Architecture, pages 222-231, February 2006.
-
(2006)
Proceedings of the Twelfth International Symposium on High-Performance Computer Architecture
, pp. 222-231
-
-
Shi, W.1
Fryman, J.B.2
Gu, G.3
Lee, H.-H.4
Zhang, Y.5
Yang, J.6
-
28
-
-
34748842601
-
Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
-
L. Singaravelu, C. Pu, H. Ḧ artig, and C. Helmuth. Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies. In Proceedings of the First ACM EuroSys Conference, pages 161-174, 2006.
-
(2006)
Proceedings of the First ACM EuroSys Conference
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
artig, H.H.3
Helmuth, C.4
|