-
1
-
-
70350673437
-
Towards automated provisioning of secure virtualized networks
-
ACM, New York
-
Cabuk, S., Dalton, C.I., Ramasamy, H., Schunter, M.: Towards automated provisioning of secure virtualized networks. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 235-245. ACM, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 235-245
-
-
Cabuk, S.1
Dalton, C.I.2
Ramasamy, H.3
Schunter, M.4
-
2
-
-
34250717227
-
Trusted Virtual Domains: Toward secure distributed services
-
HotDep
-
Griffin, J., Jaeger, T., Perez, R., Sailer, R., van Doorn, L., Caceres, R.: Trusted Virtual Domains: Toward secure distributed services. In: Proc. of 1st IEEE Workshop on Hot Topics in System Dependability (HotDep) (2005)
-
(2005)
Proc. of 1st IEEE Workshop on Hot Topics in System Dependability
-
-
Griffin, J.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Caceres, R.6
-
3
-
-
21644455412
-
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003) (October 2003)
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003) (October 2003)
-
-
-
-
4
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th conference on USENIX Security Symposium, pp. 223-238 (2004)
-
(2004)
Proceedings of the 13th conference on USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
-
6
-
-
77952330246
-
Policy enforcement and compliance proofs for Xen virtual machines
-
Jansen, B., Ramasamy, H., Schunter,M.: Policy enforcement and compliance proofs for Xen virtual machines. In: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pp. 101-110 (2008)
-
(2008)
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
, pp. 101-110
-
-
Jansen, B.1
Ramasamy, H.2
Schunter, M.3
-
7
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
ACM, New York
-
Sailer, R., Jaeger, T., Zhang, X., van Doorn, L.: Attestation-based policy enforcement for remote access. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 308-317. ACM, New York (2004)
-
(2004)
CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doorn, L.4
-
8
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
ACM, New York
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: SOSP 2005: Proceedings of the twentieth ACM symposium on Operating systems principles, pp. 1-16. ACM, New York (2005)
-
(2005)
SOSP 2005: Proceedings of the twentieth ACM symposium on Operating systems principles
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
9
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM, New York
-
Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 workshop on New security paradigms, pp. 67-77. ACM, New York (2004)
-
(2004)
NSPW 2004: Proceedings of the 2004 workshop on New security paradigms
, pp. 67-77
-
-
Sadeghi, A.R.1
Stüble, C.2
-
10
-
-
34547196300
-
A protocol for property-based attestation
-
ACM, New York
-
Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A., Stüble, C.: A protocol for property-based attestation. In: Proceedings of the first ACM workshop on Scalable trusted computing, pp. 7-16. ACM, New York (2006)
-
(2006)
Proceedings of the first ACM workshop on Scalable trusted computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.5
Stüble, C.6
-
11
-
-
24644439462
-
Property attestation: Scalable and privacy-friendly security assessment of peer computers
-
RZ3548, IBM Corporation May
-
Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation: scalable and privacy-friendly security assessment of peer computers. Research Report RZ3548, IBM Corporation (May 2004)
-
(2004)
Research Report
-
-
Poritz, J.1
Schunter, M.2
Van Herreweghen, E.3
Waidner, M.4
-
12
-
-
84991799247
-
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data
-
Petroni Jr., N., Fraser, T., Walters, A., Arbaugh, W.: An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proc. of the 15th USENIX Security Symposium (2006)
-
(2006)
Proc. of the 15th USENIX Security Symposium
-
-
Petroni Jr., N.1
Fraser, T.2
Walters, A.3
Arbaugh, W.4
-
13
-
-
70349659108
-
Semantic remote attestation: A virtual machine directed approach to trusted computing
-
Berkeley, CA, USA, p, USENIX Association
-
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: VM 2004: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium, Berkeley, CA, USA, p. 3. USENIX Association (2004)
-
(2004)
VM 2004: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium
, pp. 3
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
14
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
ACM, New York
-
Jaeger, T., Sailer, R., Shankar, U.: PRIMA: policy-reduced integrity measurement architecture. In: Proceedings of the eleventh ACM symposium on Access control models and technologies, pp. 19-28. ACM, New York (2006)
-
(2006)
Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
16
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
ACM, New York
-
Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: STC 2007: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pp. 21-29. ACM, New York (2007)
-
(2007)
STC 2007: Proceedings of the 2007 ACM workshop on Scalable trusted computing
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
17
-
-
77954339628
-
-
Security on Notebook PCs- White Paper. Mobile Platforms Group, Intel Corporation June 20
-
Bajikar, S.: Trusted Platform Module (TPM) based Security on Notebook PCs- White Paper. Mobile Platforms Group, Intel Corporation (June 20, 2002)
-
(2002)
Trusted Platform Module (TPM) based
-
-
Bajikar, S.1
-
19
-
-
54049143812
-
L.: Vtpm: virtualizing the trusted platform module
-
Berkeley, CA, USA, p
-
Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vtpm: virtualizing the trusted platform module. In: USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, Berkeley, CA, USA, p.
-
USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
van Doorn6
-
20
-
-
70350697614
-
-
USENIX Association 2006
-
USENIX Association (2006)
-
-
-
-
21
-
-
54249130839
-
-
England, P., Loeser, J.: Para-Virtualized TPM Sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, 4968, pp. 119-132. Springer, Heidelberg (2008)
-
England, P., Loeser, J.: Para-Virtualized TPM Sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119-132. Springer, Heidelberg (2008)
-
-
-
-
22
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dunlap, G., King, S., Cinar, S., Basrai, M., Chen, P.: ReVirt: enabling intrusion analysis through virtual-machine logging and replay. ACM SIGOPS Operating Systems Review 36, 211-224 (2002)
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, pp. 211-224
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
23
-
-
70350671523
-
-
Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributed Systems Security Symposium (February 2003)
-
Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributed Systems Security Symposium (February 2003)
-
-
-
-
25
-
-
21644433634
-
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
-
-
-
-
26
-
-
62949104480
-
Transparent Process Monitoring in a Virtual Environment
-
to appear
-
Sgandurra, D., Baiardi, F., Maggiari, D., Tamberi, F.: Transparent Process Monitoring in a Virtual Environment. In: Proceedings of the Third International Workshop on Views On Designing Complex Architectures (VODCA 2008), Bertinoro. ENTCS, Elsevier ScienceDirect (to appear) (2008)
-
(2008)
Proceedings of the Third International Workshop on Views On Designing Complex Architectures (VODCA 2008), Bertinoro. ENTCS, Elsevier ScienceDirect
-
-
Sgandurra, D.1
Baiardi, F.2
Maggiari, D.3
Tamberi, F.4
-
27
-
-
55349138104
-
Semantics-Driven Introspection in a Virtual Environment
-
Tamberi, F., Maggiari, D., Sgandurra, D., Baiardi, F.: Semantics-Driven Introspection in a Virtual Environment. In: Proceedings of the Fourth International Conference on Information Assurance and Security (IAS 2008), pp. 299-302 (2008)
-
(2008)
Proceedings of the Fourth International Conference on Information Assurance and Security (IAS
, pp. 299-302
-
-
Tamberi, F.1
Maggiari, D.2
Sgandurra, D.3
Baiardi, F.4
-
29
-
-
70350689751
-
-
TPM/J: Java-based API for the Trusted Platform Module (TPM), http://projects.csail.mit.edu/tc/tpmj/
-
TPM/J: Java-based API for the Trusted Platform Module (TPM), http://projects.csail.mit.edu/tc/tpmj/
-
-
-
|