-
1
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
63749110608
-
Secure Architecture and Implementation of Xen on ARM for Mobile Device
-
April
-
S. Suh, "Secure Architecture and Implementation of Xen on ARM for Mobile Device," 4th Xen Summit, IBM T.J. Watson, April 2007.
-
(2007)
4th Xen Summit, IBM T.J. Watson
-
-
Suh, S.1
-
3
-
-
70450286859
-
Secure Xen on ARM: Status and Driver Domain Separation
-
Sun Microsystems, November
-
th Xen Summit, Sun Microsystems, November 2007.
-
(2007)
th Xen Summit
-
-
Suh, S.1
-
4
-
-
70450279550
-
-
Secure Xen on ARM project
-
Secure Xen on ARM project, http://wiki.xensource.com/xenwiki/XenARM
-
-
-
-
5
-
-
51949098506
-
Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones
-
USA, January
-
th Annual IEEE Consumer Communications & Networking Conference, USA, January 2008.
-
(2008)
th Annual IEEE Consumer Communications & Networking Conference
-
-
Hwang, J.1
Suh, S.2
Heo, S.3
Park, C.4
Ryu, J.5
Park, S.6
Kim, C.7
-
7
-
-
35948950577
-
Safe Hardware Access with the Xen Virtual Machine Monitor
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson, "Safe Hardware Access with the Xen Virtual Machine Monitor," In Proceedings of the Workshop on Operating System and Architectural Support for the on-demand IT Infrastructure (OASIS), 2004.
-
(2004)
Proceedings of the Workshop on Operating System and Architectural Support for the on-demand IT Infrastructure (OASIS)
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
8
-
-
32044455630
-
Reconstructing I/O,
-
Technical Report UCAM-CL-TR-596, University of Cambridge
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson, "Reconstructing I/O," Technical Report UCAM-CL-TR-596, University of Cambridge, 2005.
-
(2005)
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
9
-
-
0036041421
-
An Empirical Study of Operating Systems Errors
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. R. Engler, "An Empirical Study of Operating Systems Errors," In Symposium on Operating Systems Principles, pp. 73-88, 2001.
-
(2001)
Symposium on Operating Systems Principles
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.R.5
-
11
-
-
33748053715
-
Get More Device Drivers out of the Kernel!
-
P. Chubb, "Get More Device Drivers out of the Kernel!," Ottawa Linux Symposium, 2004.
-
(2004)
Ottawa Linux Symposium
-
-
Chubb, P.1
-
12
-
-
77953989275
-
Shared Device Driver Model for Virtualized Mobile Handsets
-
USA, June
-
F. Armand, M. Gien, G. Maigne, G. Mardinian, "Shared Device Driver Model for Virtualized Mobile Handsets," The Workshop on Virtualization in Mobile Computing, USA, June 2008.
-
(2008)
The Workshop on Virtualization in Mobile Computing
-
-
Armand, F.1
Gien, M.2
Maigne, G.3
Mardinian, G.4
-
14
-
-
70450252853
-
-
Android Malware, http://www.wired.com/gadgetlab/2009/01/rogue-googlepho/
-
Android Malware
-
-
-
15
-
-
33845953872
-
-
National Security Agency, SE-Linux
-
National Security Agency, "Security-Enhanced Linux (SE-Linux)," http://www.nsa.gov/selinux
-
Security-Enhanced Linux
-
-
-
16
-
-
70450250883
-
TCG Mobile Trusted Module Specification
-
Trusted Computing Group, Specification version 0.9 Revision 1
-
Trusted Computing Group, "TCG Mobile Trusted Module Specification," Specification version 0.9 Revision 1, 2006.
-
(2006)
-
-
-
17
-
-
0030672130
-
A Secure and Reliable Bootstrap Architecture
-
W. A. Arbaugh, D. J. Farber, J. M. Smith, "A Secure and Reliable Bootstrap Architecture," In Proceedings of IEEE Security and Privacy Conference, pp. 65-71, 1997.
-
(1997)
Proceedings of IEEE Security and Privacy Conference
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
18
-
-
51949117497
-
-
Symantec Corporation
-
Symantec Corporation, "SymbOS. Cabir," http://securityresponse. symantec.com/avcenter/venc/data/epoc. cabir.html
-
SymbOS. Cabir
-
-
-
21
-
-
70450244111
-
-
Kprobes, http://www.ibm.com/developerworks/library/l-kprobes.html.
-
Kprobes
-
-
-
22
-
-
70450253979
-
-
iperf
-
iperf, http://sourceforge.net/projects/iperf/
-
-
-
-
23
-
-
70450268238
-
-
Bonnie, http://www.textuality.com/bonnie/
-
Bonnie
-
-
-
24
-
-
70450266285
-
-
xentop
-
xentop, http://www.xen.org/
-
-
-
-
25
-
-
84885639914
-
Detecting Past and Present Intrusions through Vulnerability-Specific Predicates
-
October
-
A. Joshi, S. T. King, G. W. Dunlap, P. M. Chen, "Detecting Past and Present Intrusions through Vulnerability-Specific Predicates," In Proceedings of the 20th Symposium on Operating Systems Principles (SOSP), October 2005.
-
(2005)
Proceedings of the 20th Symposium on Operating Systems Principles (SOSP)
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
26
-
-
57349125651
-
Behavioral Detection of Malware on Mobile Handsets
-
USA, June
-
A. Bose, X. Hu, K. G. Shin, T. Park, "Behavioral Detection of Malware on Mobile Handsets," The Sixth International Conference on Mobile Systems, Applications, and Services, USA, June 2008.
-
(2008)
The Sixth International Conference on Mobile Systems, Applications, and Services
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
28
-
-
36348992283
-
-
White Paper, Clarkson University, February
-
T. Deshane, D. Dimatos, G. Hamilton, M. Hapuarachchi, W. Hu, M. McCabe, J. N. Mathews, "Performance Isolation of a Misbehaving Virtual Machine with Xen, VMware and Solaris Containers," White Paper, Clarkson University, February 2006.
-
(2006)
Performance Isolation of a Misbehaving Virtual Machine with Xen, VMware and Solaris Containers
-
-
Deshane, T.1
Dimatos, D.2
Hamilton, G.3
Hapuarachchi, M.4
Hu, W.5
McCabe, M.6
Mathews, J.N.7
-
29
-
-
33750248123
-
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn, "Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor," Annual Computer Security Application Conference, 2005.
-
(2005)
Annual Computer Security Application Conference
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
van Doorn, L.8
-
30
-
-
51949119355
-
sHype: A secure hypervisor approach to trusted virtualized systems
-
IBM Research Report
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger. "sHype: A secure hypervisor approach to trusted virtualized systems," IBM Research Report, 2005.
-
(2005)
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
van Doorn, L.5
Griffin, J.L.6
Berger, S.7
-
32
-
-
85084160641
-
The Flask Security Architecture: System Support for Diverse Security Policies
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau, "The Flask Security Architecture: System Support for Diverse Security Policies," In Proceedings of the 8th USENIX Security Symposium, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
34
-
-
33644854066
-
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
-
D. C. Nash, T. L. Martin, D. S. Ha, and M. S. Hsiao, "Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices," In Proceedings of the Pervasive Computing and Communications Workshops, pp. 141-145, 2005.
-
(2005)
Proceedings of the Pervasive Computing and Communications Workshops
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
35
-
-
48349137639
-
An Intrusion Detection System for Battery Exhaustion Attacks Mobile Computers,
-
Master's thesis, Virginia Polytechnic Institute and State University
-
D. C. Nash, "An Intrusion Detection System for Battery Exhaustion Attacks Mobile Computers," Master's thesis, Virginia Polytechnic Institute and State University, 2005.
-
(2005)
-
-
Nash, D.C.1
|