-
3
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
4
-
-
34247361254
-
Scuba: Secure code update by attestation in sensor networks
-
Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Scuba: Secure code update by attestation in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security, WiSe (2006)
-
(2006)
Proceedings of the ACM Workshop on Wireless Security, WiSe
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
5
-
-
45849124595
-
SAKE: Software attestation for key establishment in sensor networks
-
Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. Springer, Heidelberg
-
Seshadri, A., Luk, M., Perrig, A.: SAKE: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol.5067, pp. 372-385. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5067
, pp. 372-385
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
-
6
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In: Proceedings of ACM Symposium on Operating Systems Principles, SOSP (2005), http://www.cs.cmu.edu/∼arvinds/pioneer.html
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles, SOSP
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
7
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. Springer, Heidelberg
-
Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.3813, pp. 27-41. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3813
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
8
-
-
84897982645
-
-
AMD Inc.
-
AMD, Inc.: AMD Virtualization, http://www.amd.com/virtualization
-
AMD Virtualization
-
-
-
13
-
-
33846272389
-
Strengthening software selfchecksumming via self-modifying code
-
Giffin, J., Christodorescu, M., Kruger, L.: Strengthening software selfchecksumming via self-modifying code. In: Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC (2005)
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC
-
-
Giffin, J.1
Christodorescu, M.2
Kruger, L.3
-
16
-
-
53349091372
-
Compatibility is not transparency: VMM detection myths and realities
-
Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is Not Transparency: VMM Detection Myths and Realities. In: Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS-XI) (2007)
-
(2007)
Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS-XI)
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
18
-
-
77955023368
-
-
Sun Microsystems, Inc.
-
Sun Microsystems, Inc.: Sun xVM VirtualBox, http://www.virtualbox.org/
-
Sun XVM VirtualBox
-
-
-
19
-
-
77955042370
-
-
Hex-Rays: IDA Pro., http://www.hex-rays.com/idapro/
-
IDA Pro.
-
-
-
20
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the Difficulty of Software-Based Attestation of Embedded Devices. In: Proceedings of the 16th ACM conference on Computer and Communications Security, CCS (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
25
-
-
77955046383
-
-
Trusted Computing Group
-
Trusted Computing Group: http://www.trustedcomputinggroup.org/
-
-
-
-
26
-
-
85084162270
-
Design and Implementation of a TCG-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proceedings of the 13th USENIX Security Symposium (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
28
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a Virtual Machine-based Platform for Trusted Computing. In: Proceedings of the nineteenth ACM symposium on Operating systems principles (2003)
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
29
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An execution infrastructure for tcb minimization. In: Proceedings of the ACM European Conference in Computer Systems, EuroSys (2008)
-
(2008)
Proceedings of the ACM European Conference in Computer Systems, EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
|