-
6
-
-
80755127664
-
-
National Vulnerability Database, CVE and CCE Statistics Query Page. http://web.nvd.nist.gov/view/vuln/statistics.
-
-
-
-
7
-
-
80755173962
-
-
PCI SIG: PCI-SIG Single Root I/O Virtualization. http://www.pcisig.com/ specifications/iov/single-root/.
-
-
-
-
9
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
October
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity. In ACM Conference on Computer and Communications Security (CCS), pages 38-49, October 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
11
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machines. In 2nd Symposium on Networked Systems Design and Implementation (NSDI), 2005.
-
(2005)
2nd Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
15
-
-
36849034066
-
SPEC CPU2006 benchmark descriptions
-
September
-
J. L. Henning. SPEC CPU2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34:1-17, September 2006.
-
(2006)
SIGARCH Comput. Archit. News
, vol.34
, pp. 1-17
-
-
Henning, J.L.1
-
17
-
-
84958769993
-
Side Channel Cryptanalysis of Product Ciphers
-
Computer Security - ESORICS 98
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall. Side channel cryptanalysis of product ciphers. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Computer Security: ESORICS 98, volume 1485 of Lecture Notes in Computer Science, pages 97-110. 1998. (Pubitemid 128135767)
-
(1998)
Lecture Notes in Computer Science
, Issue.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
18
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
October
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an OS kernel. In Symposium on Operating Systems Principles (SOSP), pages 207-220, October 2009.
-
(2009)
Symposium on Operating Systems Principles (SOSP)
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
21
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
June
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. In International Symposium on Computer Architecture (ISCA), June 2005.
-
(2005)
International Symposium on Computer Architecture (ISCA)
-
-
Lee, R.B.1
Kwan, P.C.S.2
Mcgregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
22
-
-
0030244801
-
The design and implementation of an operating system to support distributed multimedia applications
-
Sept.
-
I. Leslie, D. McAuley, R. Black, T. Roscoe, P. Barham, D. Evers, R. Fairbairns, and E. Hyden. The design and implementation of an operating system to support distributed multimedia applications. IEEE Journal on Selected Areas in Communication, 14(7), Sept. 1996.
-
(1996)
IEEE Journal on Selected Areas in Communication
, vol.14
, Issue.7
-
-
Leslie, I.1
Mcauley, D.2
Black, R.3
Roscoe, T.4
Barham, P.5
Evers, D.6
Fairbairns, R.7
Hyden, E.8
-
24
-
-
0039927533
-
Architectural support for copy and tamper resistant software
-
November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Architectural Support for Programming Languages and Operating Systems (ASPLOS), November 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
25
-
-
12844273420
-
Devirtualizable virtual machines enabling general, single-node, online maintenance
-
October
-
D. E. Lowell, Y. Saito, and E. J. Samberg. Devirtualizable virtual machines enabling general, single-node, online maintenance. In Architectural Support for Programming Languages and Operating Systems (ASPLOS), October 2004.
-
(2004)
Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Lowell, D.E.1
Saito, Y.2
Samberg, E.J.3
-
26
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy, pages 143-158, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
Mccune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
28
-
-
52649128991
-
Memory performance attacks: Denial of memory service in multi-core systems
-
August
-
T. Moscibroda and O. Mutlu. Memory performance attacks: Denial of memory service in multi-core systems. In Proceedings of USENIX Security Symposium, August 2007.
-
(2007)
Proceedings of USENIX Security Symposium
-
-
Moscibroda, T.1
Mutlu, O.2
-
29
-
-
80755173960
-
-
Nov.
-
L. Parziale, E. L. Alves, E. M. Dow, K. Egeler, J. J. Herne, C. Jordan, E. P. Naveen, M. S. Pattabhiraman, and K. Smith. Introduction to the new mainframe: z/VM basics, Nov. 2007. http://www.redbooks.ibm.com/redbooks/pdfs/ sg247316.pdf.
-
(2007)
Introduction to the New Mainframe: Z/VM Basics
-
-
Parziale, L.1
Alves, E.L.2
Dow, E.M.3
Egeler, K.4
Herne, J.J.5
Jordan, C.6
Naveen, E.P.7
Pattabhiraman, M.S.8
Smith, K.9
-
30
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
November
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In ACM Conference on Computer and Communications Security (CCS), November 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
31
-
-
51949119355
-
SHype: Secure hypervisor approach to trusted virtualized systems
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. V. Doorn, J. L. Griffin, S. Berger, R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. Doorn, J. Linwood, and G. S. Berger. sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research, 2005.
-
(2005)
Technical Report RC23511, IBM Research
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Doorn, L.V.5
Griffin, J.L.6
Berger, S.7
Sailer, R.8
Valdez, E.9
Jaeger, T.10
Perez, R.11
Doorn, L.12
Linwood, J.13
Berger, G.S.14
-
32
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
DOI 10.1145/1294261.1294294, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SIGOPS Oper. Syst. Rev., 41(6):335-350, December 2007. (Pubitemid 351429386)
-
(2007)
Operating Systems Review (ACM)
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
35
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
May
-
Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE Symposium on Security and Privacy, pages 380-395, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
|