-
1
-
-
84885573531
-
-
Amazon EC2. http://aws.amazon.com/ec2/.
-
Amazon EC2
-
-
-
2
-
-
80052410125
-
-
AMD Virtualization (AMD-V) Technology. http://sites.amd.com/us/ business/it-solutions/virtualization/Pages/amd-v.aspx.
-
-
-
-
4
-
-
84874416124
-
-
Intel Virtualization Technology. http://www.intel.com/technology/itj/ 2006/v10i3/1-hardware/6-vt-x-vt-i-solutions.htm.
-
Intel Virtualization Technology
-
-
-
8
-
-
42549167254
-
Hardware-rooted trust for secure key management and transient trust
-
New York, NY, USA, ACM
-
J. S. Dwoskin and R. B. Lee. Hardware-rooted trust for secure key management and transient trust. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 389-400, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 389-400
-
-
Dwoskin, J.S.1
Lee, R.B.2
-
9
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
New York, NY, USA, ACM
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proceedings of the 37th annual international symposium on Computer architecture, ISCA '10, pages 350-361, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 37th Annual International Symposium on Computer Architecture, ISCA '10
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
11
-
-
27544511310
-
-
Madison, Wisconsin, USA, June
-
R. B. Lee, P. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. pages 2-13, Madison, Wisconsin, USA, June 2005.
-
(2005)
Architecture for Protecting Critical Secrets in Microprocessors
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
12
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. SIGPLAN Not., 35:168-177, November 2000. (Pubitemid 32470896)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
13
-
-
50649096920
-
An empirical study into the security exposure to hosts of hostile virtualized environments
-
T. Ormandy. An empirical study into the security exposure to hosts of hostile virtualized environments. CanSecWest Applied Security Conference, 2007.
-
CanSecWest Applied Security Conference, 2007
-
-
Ormandy, T.1
-
14
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA, ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 199-212, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
15
-
-
35648971620
-
Cell broadband engine processor vault security architecture
-
DOI 10.1147/rd.515.0521
-
K. Shimizu, H. P. Hofstee, and J. S. Liberty. Cell broadband engine processor vault security architecture. IBM Journal of Research and Development, 51(5):521-528, 2007. (Pubitemid 350031352)
-
(2007)
IBM Journal of Research and Development
, vol.51
, Issue.5
, pp. 521-528
-
-
Shimizu, K.1
Hofstee, H.P.2
Liberty, J.S.3
-
16
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Systems Journal, 40(3):683-695, 2001. (Pubitemid 32933425)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
17
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
New York, NY, USA, ACM
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. Aegis: architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th annual international conference on Supercomputing, ICS '03, pages 160-171, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
18
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
May
-
Z. Wang and X. Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 380-395, May 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
19
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
New York, NY, USA, ACM
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 545-554, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
20
-
-
66749109266
-
A novel cache architecture with enhanced performance and security
-
Washington, DC, USA, IEEE Computer Society
-
Z. Wang and R. B. Lee. A novel cache architecture with enhanced performance and security. In Proceedings of the 41st annual IEEE/ACM International Symposium on Microarchitecture, MICRO 41, pages 83-93, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 41
, pp. 83-93
-
-
Wang, Z.1
Lee, R.B.2
|