-
2
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
Chicago, IL, USA, Oct.
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In ACM CCS'10, Chicago, IL, USA, Oct. 2010.
-
(2010)
ACM CCS'10
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
3
-
-
85084162119
-
Hand-held computers can be better smart cards
-
Washington, DC, USA, Aug.
-
D. Balfanz and E. Felten. Hand-held computers can be better smart cards. In USENIX Security Symposium, Washington, DC, USA, Aug. 1999.
-
(1999)
USENIX Security Symposium
-
-
Balfanz, D.1
Felten, E.2
-
4
-
-
73549112576
-
TOCTOU, traps, and trusted computing
-
Villach, Austria, Mar.
-
S. Bratus, N. D'Cunha, E. Sparks, and S. W. Smith. TOCTOU, traps, and trusted computing. In Trusted Computing - Challenges and Applications (TRUST'08), Villach, Austria, Mar. 2008.
-
(2008)
Trusted Computing - Challenges and Applications (TRUST'08)
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.W.4
-
5
-
-
78751542940
-
Kells: A protection framework for portable data
-
Austin, TX, USA, Dec.
-
K. Butler, S. McLaughlin, and P. McDaniel. Kells: A protection framework for portable data. In ACSAC'10, Austin, TX, USA, Dec. 2010.
-
(2010)
ACSAC'10
-
-
Butler, K.1
Mclaughlin, S.2
Mcdaniel, P.3
-
7
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY, USA, Oct.
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP'03, Bolton Landing, NY, USA, Oct. 2003.
-
(2003)
SOSP'03
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
Breckenridge, CO, USA, June
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Trustworthy and personalized computing on public kiosks. In Mobile Systems, Applications and Services (Mobisys'08), Breckenridge, CO, USA, June 2008.
-
(2008)
Mobile Systems, Applications and Services (Mobisys'08)
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
9
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
Fairfax, VA, USA, Nov.
-
K. Goldman, R. Perez, and R. Sailer. Linking remote attestation to secure tunnel endpoints. In Scalable Trusted Computing (STC'06), Fairfax, VA, USA, Nov. 2006.
-
(2006)
Scalable Trusted Computing (STC'06)
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
13
-
-
80755145327
-
-
Intel version Oct. 5
-
Intel. Trusted boot. Open-source project (version Oct. 5, 2010). http://sourceforge.net/projects/tboot/.
-
(2010)
Trusted Boot
-
-
-
14
-
-
85077706009
-
OSLO: Improving the security of trusted computing
-
Boston, MA, USA, Aug.
-
B. Kauer. OSLO: Improving the security of trusted computing. In USENIX Security Symposium, Boston, MA, USA, Aug. 2007.
-
(2007)
USENIX Security Symposium
-
-
Kauer, B.1
-
15
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Big Sky, MT, USA, Oct.
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an OS kernel. In SOSP'09, Big Sky, MT, USA, Oct. 2009.
-
(2009)
SOSP'09
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
16
-
-
80755186327
-
Usability testing a malware-resistant input mechanism
-
San Diego, CA, USA, Feb.
-
A. Libonati, J. M. McCune, and M. K. Reiter. Usability testing a malware-resistant input mechanism. In NDSS'11, San Diego, CA, USA, Feb. 2011.
-
(2011)
NDSS'11
-
-
Libonati, A.1
Mccune, J.M.2
Reiter, M.K.3
-
17
-
-
2442425355
-
Integrating flexible support for security policies into the linux operating system
-
Boston, MA, USA, June
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conference, Boston, MA, USA, June 2001.
-
(2001)
USENIX Annual Technical Conference
-
-
Loscocco, P.1
Smalley, S.2
-
18
-
-
79960801872
-
Leveraging personal devices for stronger password authentication from untrusted computers
-
M. Mannan and P. van Oorschot. Leveraging personal devices for stronger password authentication from untrusted computers. Journal of Computer Security, 19(4):703-750, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.4
, pp. 703-750
-
-
Mannan, M.1
Van Oorschot, P.2
-
19
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
Oakland, CA, USA, May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Mccune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
20
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
Glasgow, Scotland, UK, Apr.
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In The European Conference on Computer Systems (EuroSys'08), Glasgow, Scotland, UK, Apr. 2008.
-
(2008)
The European Conference on Computer Systems (EuroSys'08)
-
-
Mccune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
21
-
-
78650861686
-
Safe passage for passwords and other sensitive data
-
San Diego, CA, USA, Feb.
-
J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS'09, San Diego, CA, USA, Feb. 2009.
-
(2009)
NDSS'09
-
-
Mccune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
24
-
-
77955180941
-
Bootstrapping trust in commodity computers
-
Oakland, CA, USA, May
-
B. Parno, J. M. McCune, and A. Perrig. Bootstrapping trust in commodity computers. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Parno, B.1
Mccune, J.M.2
Perrig, A.3
-
25
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, CA, USA, Aug.
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, San Diego, CA, USA, Aug. 2004.
-
(2004)
USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
26
-
-
78650002260
-
Survivable key compromise in software update systems
-
Chicago, IL, USA, Oct.
-
J. Samuel, N. Mathewson, J. Cappos, and R. Dingledine. Survivable key compromise in software update systems. In ACM CCS'10, Chicago, IL, USA, Oct. 2010.
-
(2010)
ACM CCS'10
-
-
Samuel, J.1
Mathewson, N.2
Cappos, J.3
Dingledine, R.4
-
27
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Stevenson, WA, USA, Oct.
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP'07, Stevenson, WA, USA, Oct. 2007.
-
(2007)
SOSP'07
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
28
-
-
84885633990
-
Nexus: A new operating system for trustworthy computing
-
Brighton, UK, Oct.
-
A. Shieh, D. Williams, E. G. Sirer, and F. B. Schneider. Nexus: A new operating system for trustworthy computing. In SOSP'05, Brighton, UK, Oct. 2005.
-
(2005)
SOSP'05
-
-
Shieh, A.1
Williams, D.2
Sirer, E.G.3
Schneider, F.B.4
-
29
-
-
84893275787
-
Certified lies: Detecting and defeating government interception attacks against SSL
-
St. Lucia
-
C. Soghoian and S. Stamm. Certified lies: Detecting and defeating government interception attacks against SSL. In Financial Cryptography and Data Security (FC'11), St. Lucia, 2011.
-
(2011)
Financial Cryptography and Data Security (FC'11)
-
-
Soghoian, C.1
Stamm, S.2
-
30
-
-
80755145323
-
-
version 4.1, Sept. 19
-
A squashed read-only file system for Linux. Open-source project (version 4.1, Sept. 19, 2010). http://squashfs.sourceforge.net/.
-
(2010)
A Squashed Read-only File System for Linux
-
-
-
31
-
-
48649110347
-
Establishing and sustaining system integrity via root of trust installation
-
Miami, FL, USA, Dec.
-
L. St. Clair, J. Schiffman, T. Jaeger, and P. McDaniel. Establishing and sustaining system integrity via root of trust installation. In ACSAC'07, Miami, FL, USA, Dec. 2007.
-
(2007)
ACSAC'07
-
-
St. Clair, L.1
Schiffman, J.2
Jaeger, T.3
Mcdaniel, P.4
-
32
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
Tokyo, Japan, Nov.
-
F. Stumpf, O. Tafreschi, P. Röder, and C. Eckert. A robust integrity reporting protocol for remote attestation. In Workshop on Advances in Trusted Computing (WATC'06), Tokyo, Japan, Nov. 2006.
-
(2006)
Workshop on Advances in Trusted Computing (WATC'06)
-
-
Stumpf, F.1
Tafreschi, O.2
Röder, P.3
Eckert, C.4
-
35
-
-
80755186325
-
Lockdown: A safe and practical environment for security applications
-
July
-
A. Vasudevan, B. Parno, N. Qu, V. D. Gligor, and A. Perrig. Lockdown: A safe and practical environment for security applications. Technical Report CMU-CyLab-09-011, CyLab, Carnegie Mellon University, July 2009. http://repository.cmu.edu/cylab/5/.
-
(2009)
Technical Report CMU-CyLab-09-011, CyLab, Carnegie Mellon University
-
-
Vasudevan, A.1
Parno, B.2
Qu, N.3
Gligor, V.D.4
Perrig, A.5
-
36
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of PGP 5.0
-
Washington, D.C., USA, Aug.
-
A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In USENIX Security Symposium, Washington, D.C., USA, Aug. 1999.
-
(1999)
USENIX Security Symposium
-
-
Whitten, A.1
Tygar, J.D.2
|