-
1
-
-
34547461216
-
A comparison of software and hardware techniques for x86 virtualization
-
K. Adams et al. A comparison of software and hardware techniques for x86 virtualization, in Proc. of ASPLOS06, Oct. 2006.
-
Proc. of ASPLOS06, Oct. 2006
-
-
Adams, K.1
-
3
-
-
77952558128
-
-
AMD, AMD Whitepaper Revision 1.0, July
-
AMD, AMD-V Nested Paging. AMD Whitepaper Revision 1.0, July 2008.
-
(2008)
AMD-V Nested Paging
-
-
-
4
-
-
54249153664
-
-
Technical Report HPL-2007-2069, Hewlett-Packard Development Company, L.P., April
-
M.J. Anderson et al. Towards Trustworthy Virtualisation Environments. Technical Report HPL-2007-2069, Hewlett-Packard Development Company, L.P., April 2007.
-
(2007)
Towards Trustworthy Virtualisation Environments
-
-
Anderson, M.J.1
-
8
-
-
77952563187
-
The Reduced Address Space (RAS) for Application Memory Authentication
-
D. Champagne et al., The Reduced Address Space (RAS) for Application Memory Authentication, In Proc. of the 11th ISC'08, Sept. 2008.
-
Proc. of the 11th ISC'08, Sept. 2008
-
-
Champagne, D.1
-
9
-
-
67650799825
-
Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems
-
X. Chen et al. Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, In Proc. of ASPLOS08, March 2008.
-
Proc. of ASPLOS08, March 2008
-
-
Chen, X.1
-
11
-
-
70249085218
-
A Hypervisor-Based System for Protecting Software Runtime Memory and Persistent Storage
-
P. Dewan et al. A Hypervisor-Based System for Protecting Software Runtime Memory and Persistent Storage, SSSS'08, April 2008.
-
SSSS'08, April 2008
-
-
Dewan, P.1
-
12
-
-
42549167254
-
Hardware-rooted Trust for Secure Key Management and Transient Trust
-
J. Dwoskin and R.B. Lee. Hardware-rooted Trust for Secure Key Management and Transient Trust, Proc. of ACM CCS'07, Oct. 2007.
-
Proc. of ACM CCS'07, Oct. 2007
-
-
Dwoskin, J.1
Lee, R.B.2
-
15
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel et al., Terra: A virtual machine-based platform for trusted computing, in Proc. of SOSP, Oct. 2003.
-
Proc. of SOSP, Oct. 2003
-
-
Garfinkel, T.1
-
16
-
-
0037636094
-
Caches and Merkle Trees for Efficient Memory Authentication
-
Feb.
-
B. Gassend et al., Caches and Merkle Trees for Efficient Memory Authentication, Proc. of HPCA 2003, Feb. 2003.
-
(2003)
Proc. of HPCA
, vol.2003
-
-
Gassend, B.1
-
17
-
-
85077701725
-
Lest We Remember: Cold Boot Attacks on Encryption Keys
-
July/August
-
J. A. Halderman et al. Lest We Remember: Cold Boot Attacks on Encryption Keys. In Proc. of USENIX Security, July/August 2008.
-
(2008)
Proc. of USENIX Security
-
-
Halderman, J.A.1
-
18
-
-
77952561822
-
Intel Virtualization Technology: Hardware Support for Efficient Virtualization
-
Intel, Aug.
-
Intel, Intel Virtualization Technology: Hardware Support for Efficient Virtualization, Intel Technology Journal, Aug. 2006.
-
(2006)
Intel Technology Journal
-
-
-
20
-
-
77952556837
-
Vault: Practical Uses of Virtual Machines for Protection of Sensitive User Data
-
P. Kwan et al. Vault: Practical Uses of Virtual Machines for Protection of Sensitive User Data. In Proc. of ISPEC 2007, May 2007.
-
Proc. of ISPEC 2007, May 2007
-
-
Kwan, P.1
-
21
-
-
77952562617
-
UltraSPARC T1: Architecture and Physical Design of a 32-threaded General Purpose CPU
-
J. Laudon. UltraSPARC T1: Architecture and Physical Design of a 32-threaded General Purpose CPU, In Proc. of IEEE ISSCC, Feb. 2006.
-
Proc. of IEEE ISSCC, Feb. 2006
-
-
Laudon, J.1
-
22
-
-
85088734254
-
Architecture for Protecting Critical Secrets in Microprocessors
-
R. B. Lee et al. "Architecture for Protecting Critical Secrets in Microprocessors," Proc. of ISCA 2005, June 2005.
-
Proc. of ISCA 2005, June 2005
-
-
Lee, R.B.1
-
23
-
-
0034445599
-
Architectural Support for Copy and Tamper Resistant Software
-
D. Lie et al. Architectural Support for Copy and Tamper Resistant Software, Proc. of ASPLOS IX, 2000.
-
Proc. of ASPLOS IX, 2000
-
-
Lie, D.1
-
26
-
-
55149108173
-
Flicker: An Execution Infrastructure for TCB Minimization
-
J.M. McCune et al., Flicker: An Execution Infrastructure for TCB Minimization, In Proc. of EuroSys2008, March 2008.
-
Proc. of EuroSys2008, March 2008
-
-
McCune, J.M.1
-
29
-
-
51949095281
-
-
Sun Microsystems, http://www.opensparc.net, 2008.
-
(2008)
Sun Microsystems
-
-
-
30
-
-
47349124111
-
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly
-
B. Rogers et al., Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly, In Proc. of Int'l Symp. on Microarchitecture (MICRO2007), Dec. 2007.
-
Proc. of Int'l Symp. on Microarchitecture (MICRO2007), Dec. 2007
-
-
Rogers, B.1
-
31
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer et al., Design and implementation of a TCG-based integrity measurement architecture, In Proc. of USENIX Security, 2004.
-
Proc. of USENIX Security, 2004
-
-
Sailer, R.1
-
35
-
-
85084164351
-
Linux Security Modules: General Security Support for the Linux Kernel
-
C. Wright et al. Linux Security Modules: General Security Support for the Linux Kernel, Proc. of USENIX Security, August 2002
-
Proc. of USENIX Security, August 2002
-
-
Wright, C.1
-
37
-
-
77952576043
-
Trusted Boot: Trusted Boot: Verifying the Xen Launch
-
J. Cihula, Trusted Boot: Trusted Boot: Verifying the Xen Launch, Xen Summit 07 Fall.
-
Xen Summit 07 Fall
-
-
Cihula, J.1
|