-
6
-
-
77954727802
-
Secure virtual machine architecture reference manual
-
AMD64 virtualization rev. 3.01
-
AMD64 virtualization: Secure virtual machine architecture reference manual. AMD Publication no. 33047 rev. 3.01 (2005)
-
(2005)
AMD Publication No. 33047
-
-
-
7
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB
-
Anderson, J.P.: Computer security technology planning study. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB (1972)
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
9
-
-
54249122693
-
TOCTOU, traps, and trusted computing
-
TRUST
-
Bratus, S., D'Cunha, N., Sparks, E., Smith, S.W.: TOCTOU, traps, and trusted computing. In: Proc. Conference on Trusted Computing and Trust in Information Technologies, TRUST (2008)
-
(2008)
Proc. Conference on Trusted Computing and Trust in Information Technologies
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.W.4
-
10
-
-
3042525569
-
-
Addison-Wesley, Reading
-
Budruk, R., Anderson, D., Shanley, T.: PCI Express System Architecture. Addison-Wesley, Reading (2004)
-
(2004)
PCI Express System Architecture
-
-
Budruk, R.1
Anderson, D.2
Shanley, T.3
-
11
-
-
70449640065
-
A logic of secure systems and its applications to trusted computing
-
Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its applications to trusted computing. In: Proc. IEEE Symposium on Security and Privacy (2009)
-
Proc. IEEE Symposium on Security and Privacy (2009)
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Kaynar, D.4
-
12
-
-
78249264606
-
Getting into the SMRAM: SMM reloaded
-
Duflot, L., Levillain, O., Morin, B., Grumelard, O.: Getting into the SMRAM: SMM reloaded. In: Central Directorate for Information Systems Security (2009)
-
(2009)
Central Directorate for Information Systems Security
-
-
Duflot, L.1
Levillain, O.2
Morin, B.3
Grumelard, O.4
-
14
-
-
77954754059
-
Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor
-
Franklin, J., Seshadri, A., Qu, N., Chaki, S., Datta, A.: Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor. CMU Cylab Technical Report CMU-CyLab-08-008 (2008)
-
(2008)
CMU Cylab Technical Report CMU-CyLab-08-008
-
-
Franklin, J.1
Seshadri, A.2
Qu, N.3
Chaki, S.4
Datta, A.5
-
15
-
-
0001859527
-
The performance of microkernel-based systems
-
Härtig, H., Hohmuth, M., Liedtke, J., Schönberg, S., Wolter, J.: The performance of microkernel-based systems. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) (October 1997)
-
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) (October 1997)
-
-
Härtig, H.1
Hohmuth, M.2
Liedtke, J.3
Schönberg, S.4
Wolter, J.5
-
19
-
-
77952256837
-
Towards trustworthy computing systems: Taking microkernels to the next level
-
Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.M.: Towards trustworthy computing systems: Taking microkernels to the next level. In: Proc. ACM Operating Systems Review (2007)
-
(2007)
Proc. ACM Operating Systems Review
-
-
Heiser, G.1
Elphinstone, K.2
Kuz, I.3
Klein, G.4
Petters, S.M.5
-
21
-
-
77954694746
-
Intel virtualization technology specification for the IA-32 Intel architecture
-
April
-
Intel virtualization technology specification for the IA-32 Intel architecture. Intel Publication no. C97063-002 (April 2005)
-
(2005)
Intel Publication No. C97063-002
-
-
-
27
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal verification of an OS kernel. In: Proc. SOSP (2009)
-
Proc. SOSP (2009)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
30
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. ACM Comm. 17 (1974)
-
(1974)
ACM Comm.
, vol.17
-
-
Popek, G.J.1
Goldberg, R.P.2
-
31
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proc. ACM Conference on Computer and Communications Security, CCS (2009)
-
Proc. ACM Conference on Computer and Communications Security, CCS (2009)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
32
-
-
85084161596
-
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
-
Robin, J.S., Irvine, C.E.: Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In: Proc. USENIX Security Symposium (2000)
-
Proc. USENIX Security Symposium (2000)
-
-
Robin, J.S.1
Irvine, C.E.2
-
36
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
37
-
-
77954707179
-
Opteron exposed: Reverse engineering AMD K8 microcode updates
-
SecuriTeam
-
SecuriTeam. Opteron exposed: Reverse engineering AMD K8 microcode updates. SecuriTeam Security Reviews (2004)
-
(2004)
SecuriTeam Security Reviews
-
-
-
38
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., VanDoorn, L., Khosla, P.: Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In: Proc. SOSP (2005)
-
Proc. SOSP (2005)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
VanDoorn, L.5
Khosla, P.6
-
39
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Sheshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proc. SOSP (2007)
-
Proc. SOSP (2007)
-
-
Sheshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
40
-
-
77954743680
-
-
tboot
-
tboot. Trusted boot (2009), http://sourceforge.net/projects/tboot/
-
(2009)
Trusted Boot
-
-
-
41
-
-
77954710762
-
-
P. Technologies. Phoenix securecore (2009), http://www.phoenix.com
-
(2009)
Phoenix Securecore
-
-
-
45
-
-
77954749168
-
-
VMware. VMware ESX server system architecture (2009), http://www.vmware.com/support/esx21/doc/esx21-admin-system-architecture.html
-
(2009)
VMware ESX Server System Architecture
-
-
-
46
-
-
77954754778
-
-
VMware Communities. ESX 3.5 or Xen 4.1? (2008), http://communities. vmware.com/message/900657
-
(2008)
ESX 3.5 or Xen 4.1?
-
-
-
51
-
-
70350778763
-
-
XenSource Version 1.2 February
-
XenSource. Xen architecture overview. Version 1.2 (February 2008)
-
(2008)
Xen Architecture Overview
-
-
|