-
1
-
-
0003513832
-
Security analysis and enhancements of computer operating systems
-
National Bureau of Standards, US Department of Commerce, Apr.
-
R. P. Abbott, J. S. Chin, J. E. Donnelley, W. L. Konigsford, S. Tokubo, and D. A. Webb. Security analysis and enhancements of computer operating systems. Technical report, Institute for Computer Sciences and Technology, National Bureau of Standards, US Department of Commerce, Apr. 1976.
-
(1976)
Technical Report, Institute for Computer Sciences and Technology
-
-
Abbott, R.P.1
Chin, J.S.2
Donnelley, J.E.3
Konigsford, W.L.4
Tokubo, S.5
Webb, D.A.6
-
3
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of ACM CCS, 2010.
-
(2010)
Proceedings of ACM CCS
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
4
-
-
77952244542
-
CoreDet: A compiler and runtime system for deterministic multithreaded execution
-
Mar.
-
T. Bergan, O. Anderson, J. Devietti, L. Ceze, and D. Grossman. CoreDet: A compiler and runtime system for deterministic multithreaded execution. In ASPLOS, Mar. 2010.
-
(2010)
ASPLOS
-
-
Bergan, T.1
Anderson, O.2
Devietti, J.3
Ceze, L.4
Grossman, D.5
-
6
-
-
84910156435
-
vTPM: Virtualizing the trusted platform module
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proceedings of USENIX Security Symposium, 2006.
-
(2006)
Proceedings of USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
7
-
-
77955264460
-
Verifying safety properties with the TLA+ proof system
-
July
-
K. Chaudhuri, D. Doligez, L. Lamport, and S. Merz. Verifying safety properties with the TLA+ proof system. In IJCAR, pages 142-148, July 2010.
-
(2010)
IJCAR
, pp. 142-148
-
-
Chaudhuri, K.1
Doligez, D.2
Lamport, L.3
Merz, S.4
-
8
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Mar.
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of ASPLOS, Mar. 2008.
-
(2008)
Proceedings of ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
10
-
-
80051981663
-
Memoir - Formal specs and correctness proofs
-
Feb.
-
J. R. Douceur, J. R. Lorch, B. Parno, J. Mickens, and J. M. McCune. Memoir - formal specs and correctness proofs. Technical Report MSR-TR-2011-19, Microsoft Research, Feb. 2011.
-
(2011)
Technical Report MSR-TR-2011-19, Microsoft Research
-
-
Douceur, J.R.1
Lorch, J.R.2
Parno, B.3
Mickens, J.4
McCune, J.M.5
-
12
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In ACM SOSP, 2003.
-
(2003)
ACM SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
15
-
-
77955226231
-
Overview of the TPM key management standard
-
Sept.
-
T. Hardjono and G. Kazmierczak. Overview of the TPM key management standard. TCG Presentations: https://www.trustedcomputinggroup.org/news/, Sept. 2008.
-
(2008)
TCG Presentations
-
-
Hardjono, T.1
Kazmierczak, G.2
-
17
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
Nov.
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11):1147-1165, Nov. 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
21
-
-
34748867151
-
The SMART way to migrate replicated stateful services
-
Apr.
-
J. R. Lorch, A. Adya, W. J. Bolosky, R. Chaiken, J. R. Douceur, and J. Howell. The SMART way to migrate replicated stateful services. In EuroSys, Apr. 2006.
-
(2006)
EuroSys
-
-
Lorch, J.R.1
Adya, A.2
Bolosky, W.J.3
Chaiken, R.4
Douceur, J.R.5
Howell, J.6
-
22
-
-
21644454794
-
Open-source applications of TCPA hardware
-
J. Marchesini, S. W. Smith, O. Wild, J. Stabiner, and A. Barsamian. Open-source applications of TCPA hardware. In Proceedings of IEEE ACSAC, 2004.
-
(2004)
Proceedings of IEEE ACSAC
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Stabiner, J.4
Barsamian, A.5
-
23
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy, May 2010.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
24
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
Apr.
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, Apr. 2008.
-
(2008)
EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
25
-
-
80053150585
-
-
Microsoft Corporation. BitLocker drive encryption. http://technet. microsoft.com/en-us/library/dd548341%28WS.10%29.aspx.
-
BitLocker Drive Encryption
-
-
-
27
-
-
67650088534
-
Kendo: Efficient deterministic multithreading in software
-
Mar.
-
M. Olszewski, J. Ansel, and S. Amarasinghe. Kendo: Efficient deterministic multithreading in software. In ASPLOS, Mar. 2009.
-
(2009)
ASPLOS
-
-
Olszewski, M.1
Ansel, J.2
Amarasinghe, S.3
-
30
-
-
0038562599
-
BASE: Using abstraction to improve fault tolerance
-
R. Rodrigues, M. Castro, and B. Liskov. BASE: Using abstraction to improve fault tolerance. In SOSP, 2001.
-
(2001)
SOSP
-
-
Rodrigues, R.1
Castro, M.2
Liskov, B.3
-
32
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
L. Sarmenta, M. van Dijk, C. O'Donnell, J. Rhodes, and S. Devadas. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In Proceedings of the ACM Workshop on Scalable Trusted Computing (STC), 2006.
-
(2006)
Proceedings of the ACM Workshop on Scalable Trusted Computing (STC)
-
-
Sarmenta, L.1
Van Dijk, M.2
O'Donnell, C.3
Rhodes, J.4
Devadas, S.5
-
33
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
L. Singaravelu, C. Pu, H. Haertig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: Three case studies. In EuroSys, 2006.
-
(2006)
EuroSys
-
-
Singaravelu, L.1
Pu, C.2
Haertig, H.3
Helmuth, C.4
-
35
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
R. Ta-Min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In Proceedings of OSDI, 2006.
-
(2006)
Proceedings of OSDI
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
36
-
-
85177668179
-
-
v0.5
-
R. Toegl, T. Winkler, M. E. Steurer, M. Pirker, C. Pointner, T. Holzmann, M. Gissing, and J. Sabongui. IAIK jTSS - TCG software stack for the Java platform. v0.5 http://trustedjava.sourceforge.net/.
-
IAIK JTSS - TCG Software Stack for the Java Platform
-
-
Toegl, R.1
Winkler, T.2
Steurer, M.E.3
Pirker, M.4
Pointner, C.5
Holzmann, T.6
Gissing, M.7
Sabongui, J.8
-
37
-
-
54749125032
-
-
Trusted Computing Group Version 1.2, Revision 103
-
Trusted Computing Group. Trusted Platform Module Main Specification. Version 1.2, Revision 103, 2007.
-
(2007)
Trusted Platform Module Main Specification
-
-
|