-
1
-
-
77952335217
-
-
Diet Libe a libe optimized for small size
-
Diet Libe a libe optimized for small size, http://www.fefe.de/dietlibc/.
-
-
-
-
2
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Aug
-
Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), pages 1-18, Aug 2001.
-
(2001)
Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Oct
-
Paul Barham, Boris Dragovic, Keir Fraser, Steve Hand, Tim Harris, Alex Ho, Rolf Neugebauer Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pages 164-177, Oct 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
Aug
-
Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doom. vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th USENIX Security Symposium, pages 305-320, Aug 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Kenneth, A.3
Goldman, R.P.4
Sailer, R.5
Van Doom, L.6
-
8
-
-
0042853268
-
Integrating segmentation and paging protection for safe, efficient and transparent software extensions
-
Dec
-
Tzi-cker Chiueh, Ganesh Venkitachalam, and Prashant Pradhan. Integrating segmentation and paging protection for safe, efficient and transparent software extensions. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), pages 140-153, Dec 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 140-153
-
-
Chiueh, T.-C.1
Venkitachalam, G.2
Pradhan, P.3
-
9
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Jan
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages (POPL), pages 184-196, Jan 1998.
-
(1998)
Proceedings of the 25th ACM Symposium on Principles of Programming Languages (POPL)
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
Christian S. Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. Transactions on Software Engineering, 28(8):735-746, 2002.
-
(2002)
Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
12
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Oct
-
Tal Garfinkel, Ben Pfaf, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pages 193-206, Oct 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 193-206
-
-
Garfinkel, T.1
Pfaf, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
15
-
-
77951450625
-
Reducing TCB size by using untrusted components - Small kernels versus virtual-machine monitors
-
Sep
-
Michael Hohmuth, Michael Peter, Hermann Härtig, and Jonathan S. Shapiro. Reducing TCB size by using untrusted components - small kernels versus virtual-machine monitors. In Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, page 22, Sep 2004.
-
(2004)
Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
, pp. 22
-
-
Hohmuth, M.1
Peter, M.2
Härtig, H.3
Shapiro, J.S.4
-
17
-
-
84885639914
-
Detecting past and present intrusions through vulnerability specific predicates
-
Oct
-
Ashlesha Joshi, Samuel T. King, George W. Dunlap, and Peter M. Chen. Detecting past and present intrusions through vulnerability specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), pages 91-104, Oct 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
23
-
-
0013347999
-
The PERSEUS system architecture
-
IBM Research Division, Zurich Laboratory, Apr
-
Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, and Arnd Weber. The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, Apr 2001.
-
(2001)
Technical Report RZ 3335 (#93381)
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
24
-
-
0016081584
-
Protection and the control of information sharing in multics
-
Jul
-
Jerome H. Saltzer. Protection and the control of information sharing in multics. Communications of the ACM, 17(7):388-402, Jul 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
25
-
-
0016555241
-
The protection of information in computer systems
-
Sep
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sep 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
26
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Oct
-
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP), pages 335-350, Oct 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP)
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
28
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
Jun
-
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th International Conference on Supercomputing (ICS), pages 160-171, Jun 2003.
-
(2003)
Proceedings of the 17th International Conference on Supercomputing (ICS)
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
32
-
-
0036036793
-
Myers. Untrusted hosts and confidentiality: Secure program partitioning
-
Oct
-
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), pages 1-14, Oct 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Andrew, C.4
|