-
2
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic, "A derivation system and compositional logic for security protocols," Journal of Computer Security, vol.13, no.3, pp. 423-482, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
3
-
-
33847655213
-
Protocol Composition Logic (PCL)
-
A. Datta, A. Derek, J. C. Mitchell, and A. Roy, "Protocol Composition Logic (PCL)." Electr. Notes Theor. Comput. Sci., vol.172, pp. 311-358, 2007.
-
(2007)
Electr. Notes Theor. Comput. Sci.
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
4
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. C. Mitchell, and D. Pavlovic, "A compositional logic for proving security properties of protocols," Journal of Computer Security, vol.11, pp. 677-721, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
5
-
-
51749092540
-
Secrecy analysis in protocol composition logic
-
A. Roy, A. Datta, A. Derek, J. C. Mitchell, and J.-P. Seifert, "Secrecy analysis in protocol composition logic," Formal Logical Methods for System Security and Correctness, 2008.
-
(2008)
Formal Logical Methods for System Security and Correctness
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Seifert, J.-P.5
-
6
-
-
0003444157
-
-
Cambridge, MA, USA: MIT Press
-
R. Milner, M. Tofte, and R. Harper, The Definition of Standard ML. Cambridge, MA, USA: MIT Press, 1990.
-
(1990)
The Definition of Standard ML
-
-
Milner, R.1
Tofte, M.2
Harper, R.3
-
7
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE, vol.63, no.9, pp. 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
10
-
-
84945708698
-
An axiomatic basis for computer programming
-
C. A. R. Hoare, "An axiomatic basis for computer programming," Communications of the ACM, vol.12, no.10, pp. 576-580, 1969.
-
(1969)
Communications of the ACM
, vol.12
, Issue.10
, pp. 576-580
-
-
Hoare, C.A.R.1
-
11
-
-
84944269268
-
Local reasoning about programs that alter data structures
-
London, UK: Springer-Verlag
-
P. W. O'Hearn, J. C. Reynolds, and H. Yang, "Local reasoning about programs that alter data structures," in Proceedings of the 15th International Workshop on Computer Science Logic. London, UK: Springer-Verlag, 2001, pp. 1-19.
-
(2001)
Proceedings of the 15th International Workshop on Computer Science Logic
, pp. 1-19
-
-
O'Hearn, P.W.1
Reynolds, J.C.2
Yang, H.3
-
13
-
-
21644486314
-
-
Revision 1.4, August
-
Trusted Computing Group, "TCG Specification Architecture Overview, Specification Revision 1.4," https://www.trustedcomputinggroup.org/groups/ TCG-1-4-Architecture Overview.pdf, August 2007.
-
(2007)
TCG Specification Architecture Overview, Specification
-
-
-
15
-
-
70449649098
-
AMD64 virtualization: Secure virtual machine architecture reference manual
-
AMD Publication no. 33047 rev. 3.01, May
-
Advanced Micro Devices, "AMD64 virtualization: Secure virtual machine architecture reference manual," AMD Publication no.33047 rev. 3.01, May 2005.
-
(2005)
Advanced Micro Devices
-
-
-
17
-
-
70449691848
-
A logic of secure systems and its application to trusted computing
-
Carnegie Mellon University
-
A. Datta, J. Franklin, D. Garg, and D. Kaynar, "A logic of secure systems and its application to trusted computing," Carnegie Mellon University, Tech. Rep. CMU-CyLab-09- 001, 2009.
-
(2009)
Tech. Rep. CMU-CyLab-09-001
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Kaynar, D.4
-
18
-
-
66149170813
-
BootJacker: Compromising computers using forced restarts
-
E. M. Chan, J. C. Carlyle, F. M. David, R. Farivar, and R. H. Campbell, "BootJacker: Compromising computers using forced restarts," in Proceedings of 15th ACM Conference on Computer and Communications Security, 2008.
-
(2008)
Proceedings of 15th ACM Conference on Computer and Communications Security
-
-
Chan, E.M.1
Carlyle, J.C.2
David, F.M.3
Farivar, R.4
Campbell, R.H.5
-
19
-
-
46449133585
-
Towards trustworthy kiosk computing
-
Feb.
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Towards trustworthy kiosk computing," in Workshop on Mobile Computing Systems and Applications, Feb. 2006.
-
(2006)
Workshop on Mobile Computing Systems and Applications
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
21
-
-
70449688892
-
Hybridizing a logical framework
-
ser. Electronic Notes in Computer Science, August
-
J. Reed, "Hybridizing a logical framework," in International Workshop on Hybrid Logic 2006 (HyLo 2006), ser. Electronic Notes in Computer Science, August 2006.
-
(2006)
International Workshop on Hybrid Logic 2006 (HyLo 2006)
-
-
Reed, J.1
-
23
-
-
33646393954
-
-
May, [Online]. Available
-
"Secure virtual machine architecture reference manual." AMD Corp., May 2005. [Online]. Available: http://www.amd.com/us-en/assets/content- type/-white-papers-and-tech-docs/33047.pdf.
-
(2005)
Secure Virtual Machine Architecture Reference Manual
-
-
-
25
-
-
33745203288
-
Frame rules from answer types for code pointers
-
New York, NY, USA: ACM
-
H. Thielecke, "Frame rules from answer types for code pointers," in 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, NY, USA: ACM, 2006, pp. 309-319.
-
(2006)
33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 309-319
-
-
Thielecke, H.1
-
26
-
-
33745212701
-
Certified assembly programming with embedded code pointers
-
New York, NY, USA: ACM
-
Z. Ni and Z. Shao, "Certified assembly programming with embedded code pointers," in 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, NY, USA: ACM, 2006, pp. 320-333.
-
(2006)
33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 320-333
-
-
Ni, Z.1
Shao, Z.2
-
27
-
-
35448929044
-
Certified selfmodifying code
-
New York, NY, USA: ACM
-
H. Cai, Z. Shao, and A. Vaynberg, "Certified selfmodifying code," in ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, NY, USA: ACM, 2007, pp. 66-77.
-
(2007)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 66-77
-
-
Cai, H.1
Shao, Z.2
Vaynberg, A.3
-
28
-
-
55249085443
-
Hoare type theory, polymorphism and separation
-
A. Nanevski, G. Morrisett, and L. Birkedal, "Hoare type theory, polymorphism and separation," Journal of Functional Programming, vol. 18, no. 5&6, pp. 865-911, 2008.
-
(2008)
Journal of Functional Programming
, vol.18
, Issue.5-6
, pp. 865-911
-
-
Nanevski, A.1
Morrisett, G.2
Birkedal, L.3
-
30
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
Apr.
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, "Flicker: An execution infrastructure for tcb minimization," in Proceedings of the ACM European Conference in Computer Systems (EuroSys), Apr. 2008.
-
(2008)
Proceedings of the ACM European Conference in Computer Systems (EuroSys)
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
33
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
May
-
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "SWATT: Software-based attestation for embedded devices," in Proceedings of the IEEE Symposium on Security and Privacy, May 2004.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
34
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy platforms
-
Oct.
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: Verifying code integrity and enforcing untampered code execution on legacy platforms," in Proceedings of ACM Symposium on Operating Systems Principles (SOSP), Oct. 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
39
-
-
77952310222
-
Security evaluation of scenarios based on the TCG's TPM specification
-
S. Gurgens, C. Rudolph, D. Scheuermann, M. Atts, and R. Plaga, "Security evaluation of scenarios based on the TCG's TPM specification," in Proceedings of 12th European Symposium On Research In Computer Security, 2007.
-
(2007)
Proceedings of 12th European Symposium On Research in Computer Security
-
-
Gurgens, S.1
Rudolph, C.2
Scheuermann, D.3
Atts, M.4
Plaga, R.5
-
40
-
-
70449667269
-
Analysis of a measured launch
-
J. Millen, J. Guttman, J. Ramsdell, J. Sheehy, and B. Sniffen, "Analysis of a measured launch," The MITRE Corporation, Tech. Rep., 2007.
-
(2007)
The MITRE Corporation, Tech. Rep.
-
-
Millen, J.1
Guttman, J.2
Ramsdell, J.3
Sheehy, J.4
Sniffen, B.5
-
41
-
-
37149032670
-
-
Master's thesis, Massachusetts Institute of Technology
-
A. H. Lin, "Automated analysis of security apis," Master's thesis, Massachusetts Institute of Technology, 2005
-
(2005)
Automated Analysis of Security Apis
-
-
Lin, A.H.1
|