-
1
-
-
70449759696
-
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual 2: System Programming, 3.12 edition, September 2006.
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.12 edition, September 2006.
-
-
-
-
2
-
-
70449801605
-
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual 3: General-Purpose and System Instructions, 3.12 edition, September 2006.
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 3: General-Purpose and System Instructions, 3.12 edition, September 2006.
-
-
-
-
4
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
August
-
S. Chen, J. Xu, E.C. Sezer, P. Gauriar, and R.K. Iyer. Non-control-data attacks are realistic threats. In Proceedings of the 14th USENIX Security Symposium, pages 177-192, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
5
-
-
33845464003
-
Ups and downs of UNIX/Linux host-based security solutions
-
April
-
A. Chuvakin. Ups and downs of UNIX/Linux host-based security solutions. ;login: The Magazine of USENIX and SAGE, 28(2), April 2003.
-
(2003)
login: The Magazine of USENIX and SAGE
, vol.28
, Issue.2
-
-
Chuvakin, A.1
-
7
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S.W. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 34(10):57-66, 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
8
-
-
21644455412
-
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
-
-
-
13
-
-
70449759699
-
-
K. Kaneda. Tiny virtual machine monitor. http://www.yl.is.s.u-tokyo.ac. jp/~kaneda/tvmm/.
-
K. Kaneda. Tiny virtual machine monitor. http://www.yl.is.s.u-tokyo.ac. jp/~kaneda/tvmm/.
-
-
-
-
15
-
-
85084160699
-
-
L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proceedings of the USENIX 1996 Annual Technical Conference, Jan 1996.
-
L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proceedings of the USENIX 1996 Annual Technical Conference, Jan 1996.
-
-
-
-
17
-
-
85084162914
-
Copilot - a coprocessor-based kernel runtime integrity monitor
-
N. Petroni, T. Fraser, J. Molina, and W. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of USENIX Security Symposium, pages 179-194, 2004.
-
(2004)
Proceedings of USENIX Security Symposium
, pp. 179-194
-
-
Petroni, N.1
Fraser, T.2
Molina, J.3
Arbaugh, W.4
-
19
-
-
77952255373
-
Beyond the CPU: Defeating hardware based RAM acquisition
-
Feb
-
J. Rutkowska. Beyond the CPU: Defeating hardware based RAM acquisition. In Proceedings of BlackHat DC 2007, Feb 2007.
-
(2007)
Proceedings of BlackHat DC 2007
-
-
Rutkowska, J.1
-
20
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
October
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), pages 1-15, October 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
24
-
-
70449740368
-
-
Y. Wang, R. Roussev, C. Verbowski, A. Johnson, and D. Ladd. AskStrider: What has changed on my machine lately? Technical Report MSR-TR-2004-03, Microsoft Research, 2004.
-
Y. Wang, R. Roussev, C. Verbowski, A. Johnson, and D. Ladd. AskStrider: What has changed on my machine lately? Technical Report MSR-TR-2004-03, Microsoft Research, 2004.
-
-
-
-
25
-
-
33845390072
-
Strider GhostBuster: Why it's a bad idea for stealth software to hide files
-
Technical Report MSR-TR-2004-71, Microsoft Research
-
Y. Wang, B. Vo, R. Roussev, C. Verbowski, and A. Johnson. Strider GhostBuster: Why it's a bad idea for stealth software to hide files. Technical Report MSR-TR-2004-71, Microsoft Research, 2004.
-
(2004)
-
-
Wang, Y.1
Vo, B.2
Roussev, R.3
Verbowski, C.4
Johnson, A.5
|