-
1
-
-
35248835511
-
Towards a tamper-resistant kernel rootkit detector
-
N. Q. Anh and Y. Takefuji. Towards a tamper-resistant kernel rootkit detector. In SAC, New York, NY, USA, 2007.
-
SAC, New York, NY, USA, 2007
-
-
Anh, N.Q.1
Takefuji, Y.2
-
2
-
-
79959576295
-
A Secure and Reliable Bootstrap Architecture
-
W. Arbaugh, D. Farber, and J. Smith. A Secure and Reliable Bootstrap Architecture. In ISSP, 1997.
-
(1997)
ISSP
-
-
Arbaugh, W.1
Farber, D.2
Smith, J.3
-
3
-
-
4444265683
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebar, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP, New York, NY, 2003.
-
SOSP, New York, NY, 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebar, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
77952579228
-
Scalable Architectural Support for Trusted Software
-
D. Champagne and R. Lee. Scalable Architectural Support for Trusted Software. In HPCA, 2010.
-
(2010)
HPCA
-
-
Champagne, D.1
Lee, R.2
-
5
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In ASPLOS, Seattle, WA, USA, 2008.
-
ASPLOS, Seattle, WA, USA, 2008
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
6
-
-
77950972215
-
SHIELDSTRAP: Making Secure Processors Truly Secure
-
S. Chhabra, B. Rogers, and Y. Solihin. SHIELDSTRAP: Making Secure Processors Truly Secure. In ICCD, 2009.
-
(2009)
ICCD
-
-
Chhabra, S.1
Rogers, B.2
Solihin, Y.3
-
7
-
-
0034442456
-
Hoard: A scalable memory allocator for multithreaded applications
-
Emery D. Berger and Kathryn S. Mckinley and Robert D. Blumofe and Paul R. Wilson. Hoard: A scalable memory allocator for multithreaded applications. In ASPLOS, 2000.
-
(2000)
ASPLOS
-
-
Berger, E.D.1
Mckinley, K.S.2
Blumofe, R.D.3
Wilson, P.R.4
-
8
-
-
0003629991
-
-
FIPS Publication 180-1. NIST, Federal Information Processing Standards
-
FIPS Publication 180-1. Secure Hash Standard. NIST, Federal Information Processing Standards, 1995.
-
(1995)
Secure Hash Standard
-
-
-
9
-
-
84955507265
-
Caches and Hash Trees for Efficient Memory Integrity Verification
-
B. Gassend, G. Suh, D. Clarke, M. Dijk, and S. Devadas. Caches and Hash Trees for Efficient Memory Integrity Verification. In HPCA, 2003.
-
(2003)
HPCA
-
-
Gassend, B.1
Suh, G.2
Clarke, D.3
Dijk, M.4
Devadas, S.5
-
15
-
-
33846548478
-
Comprehensively and efficiently protecting the heap
-
M. Kharbutli, X. Jiang, Y. Solihin, G. Venkataramani, and M. Prvulovic. Comprehensively and efficiently protecting the heap. SIGOPS Oper. Syst. Rev., 40(5):207-218, 2006.
-
(2006)
SIGOPS Oper. Syst. Rev.
, vol.40
, Issue.5
, pp. 207-218
-
-
Kharbutli, M.1
Jiang, X.2
Solihin, Y.3
Venkataramani, G.4
Prvulovic, M.5
-
16
-
-
4444322842
-
Specifying and Verifying Hardware for Tamper-Resistant Software
-
D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz. Specifying and Verifying Hardware for Tamper-Resistant Software. In ISSP, 2003.
-
(2003)
ISSP
-
-
Lie, D.1
Mitchell, J.2
Thekkath, C.3
Horowitz, M.4
-
17
-
-
0034445599
-
Architectural Support for Copy and Tamper Resistant Software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. MItchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In ASPLOS, 2000.
-
(2000)
ASPLOS
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
MItchell, J.6
Horowitz, M.7
-
18
-
-
2342499828
-
Implementing an untrusted operating system on trusted hardware
-
D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In SOSP, 2003.
-
(2003)
SOSP
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
19
-
-
0036469676
-
Simics: A Full System Simulation Platform
-
P. S. Magnusson, M. Christensson, J. Eskilson, D. Forsgren, G. Hallberg, J. Hogberg, F. Larsson, A. Moestedt, and B. Werner. Simics: A Full System Simulation Platform. IEEE Computer Society, 35(2):50-58, 2002.
-
(2002)
IEEE Computer Society
, vol.35
, Issue.2
, pp. 50-58
-
-
Magnusson, P.S.1
Christensson, M.2
Eskilson, J.3
Forsgren, D.4
Hallberg, G.5
Hogberg, J.6
Larsson, F.7
Moestedt, A.8
Werner, B.9
-
20
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for tcb minimization. In Eurosys, Glasgow, Scotland UK, 2008.
-
Eurosys, Glasgow, Scotland UK, 2008
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
22
-
-
47349124111
-
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly
-
B. Rogers, S. Chhabra, Y. Solihin, and M. Prvulovic. Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. In MICRO, 2007.
-
(2007)
MICRO
-
-
Rogers, B.1
Chhabra, S.2
Solihin, Y.3
Prvulovic, M.4
-
23
-
-
34247118899
-
Efficient Data Protection for Distributed Shared Memory Multiprocessors
-
B. Rogers, Y. Solihin, and M. Prvulovic. Efficient Data Protection for Distributed Shared Memory Multiprocessors. In PACT, 2006.
-
(2006)
PACT
-
-
Rogers, B.1
Solihin, Y.2
Prvulovic, M.3
-
24
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In SOSP, 2007.
-
(2007)
SOSP
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
25
-
-
40349095134
-
Authentication Control Point and Its Implications for Secure Processor Design
-
W. Shi and H.-H. Lee. Authentication Control Point and Its Implications for Secure Processor Design. In MICRO, 2006.
-
(2006)
MICRO
-
-
Shi, W.1
Lee, H.-H.2
-
26
-
-
10444227999
-
Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems
-
W. Shi, H.-H. Lee, M. Ghosh, and C. Lu. Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. In PACT, 2004.
-
(2004)
PACT
-
-
Shi, W.1
Lee, H.-H.2
Ghosh, M.3
Lu, C.4
-
27
-
-
27544453319
-
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation
-
W. Shi, H.-H. Lee, M. Ghosh, C. Lu, and A. Boldyreva. High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. In ISCA, 2005.
-
(2005)
ISCA
-
-
Shi, W.1
Lee, H.-H.2
Ghosh, M.3
Lu, C.4
Boldyreva, A.5
-
28
-
-
79959622920
-
-
Standard Performance Evaluation Corporation. http://www.spec.org, 2006.
-
(2006)
-
-
-
29
-
-
1142280988
-
AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
-
G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In ICS, 2003.
-
(2003)
ICS
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
30
-
-
84944412608
-
Efficient Memory Integrity Verification and Encryption for Secure Processor
-
G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. Efficient Memory Integrity Verification and Encryption for Secure Processor. In MICRO, 2003.
-
(2003)
MICRO
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
31
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
R. Ta-min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In OSDI, 2006.
-
(2006)
OSDI
-
-
Ta-min, R.1
Litty, L.2
Lie, D.3
-
32
-
-
84978382687
-
Memory resource management in vmware esx server
-
C. A. Waldspurger. Memory resource management in vmware esx server. SIGOPS Operating Systems Review, 36(SI):181-194, 2002.
-
(2002)
SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 181-194
-
-
Waldspurger, C.A.1
-
33
-
-
33845900936
-
Improving Cost, Performance, and Security of Memory Encryption and Authentication
-
C. Yan, B. Rogers, D. Englender, Y. Solihin, and M. Prvulovic. Improving Cost, Performance, and Security of Memory Encryption and Authentication. In ISCA, 2006.
-
(2006)
ISCA
-
-
Yan, C.1
Rogers, B.2
Englender, D.3
Solihin, Y.4
Prvulovic, M.5
-
34
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
J. Yang and K. G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In VEE, 2008.
-
(2008)
VEE
-
-
Yang, J.1
Shin, K.G.2
-
35
-
-
84944392287
-
Fast Secure Processor for Inhibiting Software Piracy and Tampering
-
J. Yang, Y. Zhang, and L. Gao. Fast Secure Processor for Inhibiting Software Piracy and Tampering. In MICRO, 2003.
-
(2003)
MICRO
-
-
Yang, J.1
Zhang, Y.2
Gao, L.3
-
36
-
-
28444455956
-
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
-
Y. Zhang, L. Gao, J. Yang, X. Zhang, and R. Gupta. SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. In HPCA, 2005.
-
(2005)
HPCA
-
-
Zhang, Y.1
Gao, L.2
Yang, J.3
Zhang, X.4
Gupta, R.5
|