-
1
-
-
78349235292
-
Current trends in cyber attacks on mobile and embedded systems
-
September
-
K. Stammberger, "Current trends in cyber attacks on mobile and embedded systems, " Embedded Computing Design, September 2009. Available:http://embedded-computing.com/current-trends-cyber-attacksmobile- embedded-systems
-
(2009)
Embedded Computing Design
-
-
Stammberger, K.1
-
2
-
-
84893047581
-
-
ARM TrustZone Technology. Available: http://www.arm.com/products/ processors/technologies/trustzone.php
-
ARM TrustZone Technology
-
-
-
4
-
-
79957901849
-
-
CP 67
-
CP 67. Available: http://en.wikipedia.org/wiki/IBM-System/360-Model-67
-
-
-
-
5
-
-
79957885328
-
-
VMware. Available: http://www.vmware.com/
-
-
-
-
7
-
-
79957891514
-
-
OKL4 Microvisor
-
OKL4 Microvisor. Available: http://www.ok-labs.com/products/okl4- microvisor
-
-
-
-
8
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
October
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, "SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes", Proceedings of the 21st Symposium on Operating System Principles(SOSP 2007), October 2007.
-
(2007)
Proceedings of the 21st Symposium on Operating System Principles(SOSP 2007)
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
9
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
June
-
M. Xu, X. Jiang, R. Sandhu, and X. Zhang, "Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection", Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007), June 2007.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007)
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
-
10
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
March
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. Ports, "Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems", Proceedings of the 13th Annual International ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2008.
-
(2008)
Proceedings of the 13th Annual International ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.8
-
12
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
July
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie, "Hypervisor Support for Identifying Covertly Executing Binaries", Proceedings of the 17th USENIX Security Symposium, pp. 243-258, July 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
13
-
-
63149097189
-
Virtualization as an enabler for security in mobile devices
-
April
-
J. Brakensiek, A. Dröge, M. Botteck, H. Härtig, and A. Lackorzynski, "Virtualization as an Enabler for Security in Mobile Devices", First Workshop on Isolation and Integration in Embedded Systems (IIES '08) , April 2008.
-
(2008)
First Workshop on Isolation and Integration in Embedded Systems (IIES '08)
-
-
Brakensiek, J.1
Dröge, A.2
Botteck, M.3
Härtig, H.4
Lackorzynski, A.5
-
15
-
-
79957918941
-
-
VirtualLogix Available: http://www.virtuallogix.com/
-
-
-
-
16
-
-
79957918679
-
-
accessed May 2010
-
G. Heiser, "Benchmarks: How not to do them", accessed May 2010. Available: http://www.ok-labs.com/blog/entry/benchmarks-how-not-todo- them/
-
Benchmarks: How Not to Do Them
-
-
Heiser, G.1
-
17
-
-
72249120603
-
SeL4: Formal Verification of an OS Kernel
-
October
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal Verification of an OS Kernel", Proceedings of the 22nd ACM Symposium on OS Principles (SOSP '09) , October 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on OS Principles (SOSP '09)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
18
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization", Proceedings of the nineteenth ACM symposium on Operating Systems Principles (SOSP), vol. 37, 5, ACM Press, pp. 164- 177, October 2003. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
19
-
-
51949098506
-
Xen on ARM: System virtualization using xen hypervisor for arm-based secure mobile phones
-
January
-
J-Y. Hwang, S-B. Suh, S-K. Heo, C-J. Park, J-M. Ryu, S-Y. Park, and C-R. Kim, "Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones", 5th IEEE Consumer Communications and Networking Conference (CCNC 2008), January 2008.
-
(2008)
5th IEEE Consumer Communications and Networking Conference (CCNC 2008)
-
-
Hwang, J.-Y.1
Suh, S.-B.2
Heo, S.-K.3
Park, C.-J.4
Ryu, J.-M.5
Park, S.-Y.6
Kim, C.-R.7
-
20
-
-
70849091604
-
An empirical study into the security exposure to hosts of hostile virtualized environments
-
April
-
T. Ormandy, "An empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments", CanSecWest, April 2007. Available: http://taviso.decsystem.org/virtsec.pdf
-
(2007)
CanSecWest
-
-
Ormandy, T.1
-
21
-
-
33745763847
-
Mobile platform security
-
C. Gehrmann and P. Ståhl, "Mobile Platform Security", Ericsson Review, No. 02, 2006. Available: http://www.ericsson.com/ericsson/ corpinfo/publications/review/2006-0 2/files/mobile-platform-security.pdf
-
(2006)
Ericsson Review
, Issue.2
-
-
Gehrmann, C.1
Ståhl, P.2
-
22
-
-
79957892291
-
-
Open Virtual Platforms
-
Open Virtual Platforms. Available: http://www-ovpworld.org/
-
-
-
-
23
-
-
79957894115
-
-
ST-Ericsson, U8500 smart phone platform
-
ST-Ericsson, U8500 smart phone platform. Available: http://www. stericsson.com/platforms/U8500.jsp
-
-
-
|