-
2
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security (CCS '10), pages 38-49, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10)
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
3
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
S. Berger, R. Cáceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan. TVDc: managing security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev., 42(1):40-47, 2008.
-
(2008)
SIGOPS Oper. Syst. Rev.
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
4
-
-
80755188353
-
-
BusyBox. http://www.busybox.net/.
-
-
-
-
5
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
DOI 10.1145/1346281.1346284, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D.R.K Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th international conference on Architectural support for programming languages and operating systems (ASPLOS'13), pages 2-13, 2008. (Pubitemid 351585389)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
8
-
-
44049086023
-
Aes-cbc + elephant diffuser: A disk encryption algorithm for windows vista
-
Niels Ferguson. Aes-cbc + elephant diffuser: A disk encryption algorithm for windows vista. Microsoft Corporation Technical Report, 2006.
-
(2006)
Microsoft Corporation Technical Report
-
-
Ferguson, N.1
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM symposium on Operating systems principles (SOSP '03), pages 193-206, 2003. (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
0003722586
-
-
Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba revision 3.0b, October
-
Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification. revision 3.0b, October 2006.
-
(2006)
Advanced Configuration and Power Interface Specification
-
-
-
14
-
-
77954969841
-
Nohype: Virtualized cloud infrastructure without the virtualization
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. Nohype: virtualized cloud infrastructure without the virtualization. In Proceedings of the 37th annual international symposium on Computer architecture (ISCA '10), pages 350-361, 2010.
-
(2010)
Proceedings of the 37th Annual International Symposium on Computer Architecture (ISCA '10)
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
15
-
-
72249120603
-
Sel4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: formal verification of an OS kernel. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP '09), pages 207-220, 2009.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (SOSP '09)
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
16
-
-
77954962880
-
Hacking 3D (and breaking out of VMWare)
-
K. Kortchinsky. Hacking 3D (and breaking out of VMWare). In Black Hat conference, 2009.
-
(2009)
Black Hat Conference
-
-
Kortchinsky, K.1
-
17
-
-
84903437325
-
-
Accessed in August 2011
-
Dartmouth PKI Lab. TPM reset attack. http://www.cs.dartmouth.edu/~pkilab/ sparks/. Accessed in August 2011.
-
TPM Reset Attack
-
-
-
19
-
-
77955186544
-
Efficient TCB reduction and attestation
-
May
-
J. McCune, Y. Li, N. Qu, A. Datta, V. Gligor, and A. Perrig. Efficient TCB reduction and attestation. In the 31st IEEE Symposium on Security and Privacy, May 2010.
-
(2010)
The 31st IEEE Symposium on Security and Privacy
-
-
Mccune, J.1
Li, Y.2
Qu, N.3
Datta, A.4
Gligor, V.5
Perrig, A.6
-
20
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
March/April
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. In Proceedings of the ACM European Conference on Computer Systems (EuroSys), March/April 2008.
-
(2008)
Proceedings of the ACM European Conference on Computer Systems (EuroSys)
-
-
Mccune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
22
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
DOI 10.1109/CSAC.2005.13, 1565255, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn. Building a MAC-based security architecture for the xen opensource hypervisor. In Proceedings of the 21 st Annual Computer Security Applications Conference (ACSAC), pages 276-285, 2005. (Pubitemid 46116484)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
24
-
-
84871506561
-
-
Accessed in August 2011
-
Secunia. Xen multiple vulnerability report. http://secunia.com/ advisories/44502/. Accessed in August 2011.
-
Xen Multiple Vulnerability Report
-
-
-
26
-
-
35648971620
-
Cell broadband engine processor vault security architecture
-
DOI 10.1147/rd.515.0521
-
K. Shimizu, H. P. Hofstee, and J. S. Liberty. Cell broadband engine processor vault security architecture. IBM J. Res. Dev., pages 521-528, September 2007. (Pubitemid 350031352)
-
(2007)
IBM Journal of Research and Development
, vol.51
, Issue.5
, pp. 521-528
-
-
Shimizu, K.1
Hofstee, H.P.2
Liberty, J.S.3
-
28
-
-
80755174225
-
-
Trusted Computing Group. https://www.trustedcomputinggroup.org/.
-
-
-
-
29
-
-
78650023510
-
-
July
-
Trusted Computing Group. TPM specifications version 1.2. https://www.trustedcomputinggroup.org/downloads/specifications/tpm/tpm, July 2005.
-
(2005)
TPM Specifications Version 1.2
-
-
|