-
1
-
-
77952367894
-
DICE user's manual
-
R. Aigner. DICE User's Manual. Technical report, Technische Universität Dresden, 2007. http://os.inf.tu-dresden.de/ dice/manual.pdf.
-
(2007)
Technical Report
-
-
Aigner, R.1
-
2
-
-
54249153664
-
Towards trustworthy virtualisation environments: Xen library os security service infrastructure
-
Hewlett-Packard Development Company, L.P., April
-
M. J. Anderson, M. Moffie, and C. I. Dalton. Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. Technical Report HPL-2007-2069, Hewlett-Packard Development Company, L.P., April 2007.
-
(2007)
Technical Report HPL-2007-2069
-
-
Anderson, M.J.1
Moffie, M.2
Dalton, C.I.3
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
ACM Press New York, NY, USA
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on operating systems principles, pages 164-177. ACM Press New York, NY, USA, 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hnd, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
0021122553
-
Software errors and complexity: An empirical investigation
-
V. R. Basili and B. T. Perricone. Software errors and complexity: an empirical investigation. Commun. ACM, 27(1):42-52, 1984.
-
(1984)
Commun. ACM
, vol.27
, Issue.1
, pp. 42-52
-
-
Basili, V.R.1
Perricone, B.T.2
-
6
-
-
77954980595
-
Utilizing IOMMUs for virtualization in Linux and Xen
-
M. Ben-Yehuda, J. Mason, O. Krieger, J. Xenidis, L. V. Doom, A. Mallick, J. Nakajima, and E. Wahlig. Utilizing IOMMUs for Virtualization in Linux and Xen. In Proceedings of the 2006 Ottawa Linux Symposium, 2006.
-
(2006)
Proceedings of the 2006 Ottawa Linux Symposium
-
-
Ben-Yehuda, M.1
Mason, J.2
Krieger, O.3
Xenidis, J.4
Doom, L.V.5
Mallick, A.6
Nakajima, J.7
Wahlig, E.8
-
7
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
Berkeley, CA, USA, USENIX Association
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doom. vTPM: virtualizing the trusted platform module. In Proceedings of the 15th USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 21-21
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doom, L.6
-
9
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131-152, Spring 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
10
-
-
0035703699
-
When virtual is better than real
-
Washington, DC, USA, IEEE Computer Society
-
P. M. Chen and B. D. Noble. When virtual is better than real. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems, page 133, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
Proceedings of the 8th Workshop on Hot Topics in Operating Systems
, pp. 133
-
-
Chen, P.M.1
Noble, B.D.2
-
13
-
-
33846306388
-
A nitpicker's guide to a minimalcomplexity secure GUI
-
Washington, DC, USA, IEEE Computer Society
-
N. Feske and C. Helmuth. A nitpicker's guide to a minimalcomplexity secure GUI. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 85-94, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 85-94
-
-
Feske, N.1
Helmuth, C.2
-
14
-
-
35948950577
-
Safe hardware access with the Xen virtual machine monitor
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe hardware access with the Xen virtual machine monitor. In Proceedings of the 1st Workshop on Operating System and Architectural Support for the on demand IT Infrastructure, 2004.
-
(2004)
Proceedings of the 1st Workshop on Operating System and Architectural Support for the on Demand IT Infrastructure
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
15
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press New York, NY, USA
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 193-206. ACM Press New York, NY, USA, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
16
-
-
0003406380
-
-
RFC 2764, IETF, Feb.
-
B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and A. Malis. A Framework for IP Based Virtual Private Networks. RFC 2764, IETF, Feb. 2000.
-
(2000)
A Framework for IP Based Virtual Private Networks
-
-
Gleeson, B.1
Lin, A.2
Heinanen, J.3
Armitage, G.4
Malis, A.5
-
17
-
-
77951450625
-
Reducing TCB size by using untrusted components: Small kernels versus virtual-machine monitors
-
ACM Press New York, NY, USA
-
M. Hohmuth, M. Peter, H. Härtig, and J. Shapiro. Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. In Proceedings of the 11th ACM SIGOPS European workshop: beyond the PC. ACM Press New York, NY, USA, 2004.
-
(2004)
Proceedings of the 11th ACM SIGOPS European Workshop: beyond the PC
-
-
Hohmuth, M.1
Peter, M.2
Härtig, H.3
Shapiro, J.4
-
20
-
-
38049026664
-
An Open Trusted Computing Architecture: Secure virtual machines enabling user-defined policy enforcement
-
D. Kuhlmann, R. Landfermann, H. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi. An Open Trusted Computing Architecture: Secure virtual machines enabling user-defined policy enforcement. Technical report, OpenTC consortium, 2006. https://secure.opentc.net/otc-HighLevelOverview/OTC-Architecture.High- level.overview.pdf.
-
(2006)
Technical Report, OpenTC Consortium
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
22
-
-
77952329706
-
-
Microsoft Corporation. BitLocker Drive Encryption, 2007. http : //technet.microsoft.com/en-us/windowsvista/aa905065. aspx.
-
(2007)
BitLocker Drive Encryption
-
-
-
23
-
-
0038562418
-
-
Technical Report 800-812, National Institute of Standards and Technology. National Institute of Standards and Technology, October
-
National Institute of Standards and Technology. An Introduction to Computer Security: the NIST Handbook. Technical Report 800-812, National Institute of Standards and Technology, October 1995.
-
(1995)
An Introduction to Computer Security: The NIST Handbook
-
-
-
24
-
-
0036986569
-
The distribution of faults in a large industrial software system
-
T. J. Ostrand and E. J. Weyuker. The distribution of faults in a large industrial software system. SIGSOFT Softw. Eng. Notes, 27(4):55-64, 2002.
-
(2002)
SIGSOFT Softw. Eng. Notes
, vol.27
, Issue.4
, pp. 55-64
-
-
Ostrand, T.J.1
Weyuker, E.J.2
-
25
-
-
85048404745
-
Preventing privilege escalation
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In Proceedings of the 12th USENIX Security Symposium, pages 16-16, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 16-16
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
26
-
-
0032636223
-
Xenoservers: Accountable execution of untrusted programs
-
Washington, DC, USA, IEEE Computer Society
-
D. Reed, I. Pratt, P. Menage, S. Early, and N. Stratford. Xenoservers: Accountable execution of untrusted programs. In Proceedings of the 7th Workshop on Hot Topics in Operating Systems, page 136, Washington, DC, USA, 1999. IEEE Computer Society.
-
(1999)
Proceedings of the 7th Workshop on Hot Topics in Operating Systems
, pp. 136
-
-
Reed, D.1
Pratt, I.2
Menage, P.3
Early, S.4
Stratford, N.5
-
28
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223-238, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doom, L.4
-
29
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Berkeley, CA, USA, USENIX Association
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the 10th USENIX Security Symposium, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
31
-
-
33646895419
-
Can we make operating systems reliable and secure?
-
A. Tanenbaum, J. Herder, and H. Bos. Can we make operating systems reliable and secure? Computer, 39(5):44-51, 2006.
-
(2006)
Computer
, vol.39
, Issue.5
, pp. 44-51
-
-
Tanenbaum, A.1
Herder, J.2
Bos, H.3
-
33
-
-
70749096362
-
-
Technical Report (Unattributed)
-
(Unattributed). TPM Main Part 1 Design Principles. Technical report, Trusted Computing Group, 2007. https://www. trustedcomputinggroup.org/specs/TPM/ mainP1DPrev103. zip.
-
(2007)
TPM Main Part 1 Design Principles
-
-
-
35
-
-
77952336932
-
-
XenSource. XenApi - Xen Wiki, 2007. http://wiki.xensource. com/xenwiki/XenApi.
-
(2007)
XenApi - Xen Wiki
-
-
-
36
-
-
78650822098
-
XenSocket: A high-throughput interdomain transport for VMs
-
Secaucus, NJ, USA, Springer-Verlag New York, Inc.
-
X. Zhang, S. McIntosh, P. Rohatgi, and J. Griffin. XenSocket: A high-throughput interdomain transport for VMs. In Proceedings of Middleware 2007, Secaucus, NJ, USA, 2007. Springer-Verlag New York, Inc.
-
(2007)
Proceedings of Middleware 2007
-
-
Zhang, X.1
McIntosh, S.2
Rohatgi, P.3
Griffin, J.4
|