-
3
-
-
82655166372
-
-
Filevault in mac osx. http://www.apple.com/macosx/whatsnew/ features.html#filevault2.
-
Filevault in Mac Osx
-
-
-
5
-
-
34247885571
-
Intel virtualization technology for directed I/O
-
D. Abramson, J. Jackson, S. Muthrasanallur, G. Neiger, G. Regnier, R. Sankaran, I. Schoinas, R. Uhlig, B. Vembu, and J. Wiegert. Intel virtualization technology for directed I/O. Intel technology journal, 10(3):179-192, 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 179-192
-
-
Abramson, D.1
Jackson, J.2
Muthrasanallur, S.3
Neiger, G.4
Regnier, G.5
Sankaran, R.6
Schoinas, I.7
Uhlig, R.8
Vembu, B.9
Wiegert, J.10
-
7
-
-
82655178747
-
-
Amazon Inc. Amazon machine image. http://aws.amazon.com/amis, 2011.
-
(2011)
Amazon Machine Image
-
-
-
11
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In Proc. CCS, pages 38-49, 2010.
-
(2010)
Proc. CCS
, pp. 38-49
-
-
Azab, A.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.6
-
12
-
-
21644433634
-
Xen and the art of virtualization
-
ACM
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. SOSP. ACM, 2003.
-
(2003)
Proc. SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
13
-
-
82655178636
-
The turtles project: Design and implementation of nested virtualization
-
M. Ben-Yehuda, M. D. Day, Z. Dubitzky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B.-A. Yassour. The turtles project: Design and implementation of nested virtualization. In Proc. OSDI, 2010.
-
Proc. OSDI, 2010
-
-
Ben-Yehuda, M.1
Day, M.D.2
Dubitzky, Z.3
Factor, M.4
Har'El, N.5
Gordon, A.6
Liguori, A.7
Wasserman, O.8
Yassour, B.-A.9
-
14
-
-
35348963573
-
Daonity - Grid security from two levels of virtualization
-
DOI 10.1016/j.istr.2007.05.005, PII S1363412707000258
-
H. Chen, J. Chen, W. Mao, and F. Yan. Daonity-grid security from two levels of virtualization. Information Security Technical Report, 12(3):123-138, 2007. (Pubitemid 47600054)
-
(2007)
Information Security Technical Report
, vol.12
, Issue.3
, pp. 123-138
-
-
Chen, H.1
Chen, J.2
Mao, W.3
Yan, F.4
-
15
-
-
58049139900
-
Tamper-resistant execution in an untrusted operating system using a virtual machine monitor
-
Fudan University
-
H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, P. Yew, and W. Mao. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. Parallel Processing Institute Technical Report, Number: FDUPPITR-2007-0801, Fudan University, 2007.
-
(2007)
Parallel Processing Institute Technical Report, Number: FDUPPITR-2007-0801
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Yang, Z.4
Chen, R.5
Zang, B.6
Yew, P.7
Mao, W.8
-
17
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
ACM
-
X. Chen, T. Garfinkel, E. Lewis, P. Subrahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin, and D. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proc. ASPLOS, pages 2-13. ACM, 2008.
-
(2008)
Proc. ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.3
Subrahmanyam, P.4
Waldspurger, C.5
Boneh, D.6
Dwoskin, J.7
Ports, D.8
-
18
-
-
84863391249
-
SR-IOV networking in Xen: Architecture, design and implementation
-
USENIX
-
Y. Dong, Z. Yu, and G. Rose. SR-IOV networking in Xen: Architecture, design and implementation. In Proc. Workshop on I/O virtualization. USENIX, 2008.
-
(2008)
Proc. Workshop on I/O Virtualization
-
-
Dong, Y.1
Yu, Z.2
Rose, G.3
-
19
-
-
55549119760
-
Distributed caching with memcached
-
B. Fitzpatrick. Distributed caching with memcached. Linux journal, 2004.
-
(2004)
Linux Journal
-
-
Fitzpatrick, B.1
-
20
-
-
77955886271
-
-
Flexiant Inc. Flexiscale public cloud. http://www. flexiant.com/products/ flexiscale/.
-
Flexiscale Public Cloud
-
-
-
21
-
-
78650882184
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Operating Systems Review, 37(5):206, 2003.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.5
, pp. 206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
22
-
-
84944386303
-
When virtual is harder than real: Security challenges in virtual machine based computing environments
-
T. Garfinkel and M. Rosenblum. When virtual is harder than real: Security challenges in virtual machine based computing environments. In Proc. HotOS, 2005.
-
Proc. HotOS, 2005
-
-
Garfinkel, T.1
Rosenblum, M.2
-
24
-
-
84926427148
-
Survey of virtual machine research
-
R. Goldberg. Survey of virtual machine research. IEEE Computer, 7(6):34-45, 1974.
-
(1974)
IEEE Computer
, vol.7
, Issue.6
, pp. 34-45
-
-
Goldberg, R.1
-
25
-
-
85076898936
-
Difference engine: Harnessing memory redundancy in virtual machines
-
D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference engine: harnessing memory redundancy in virtual machines. In Proc. OSDI, pages 309-322, 2008.
-
(2008)
Proc. OSDI
, pp. 309-322
-
-
Gupta, D.1
Lee, S.2
Vrable, M.3
Savage, S.4
Snoeren, A.C.5
Varghese, G.6
Voelker, G.M.7
Vahdat, A.8
-
29
-
-
38149053957
-
Out-of-the-box monitoring of VM-based high-interaction honeypots
-
X. Jiang and X. Wang. Out-of-the-box monitoring of VM-based high-interaction honeypots. In Proc. RAID, pages 198-218, 2007.
-
(2007)
Proc. RAID
, pp. 198-218
-
-
Jiang, X.1
Wang, X.2
-
30
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
-
ACM
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In Proc. CCS, pages 128-138. ACM, 2007.
-
(2007)
Proc. CCS
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
31
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
E. Keller, J. Szefer, J. Rexford, and R. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proc. ISCA, pages 350-361, 2010.
-
(2010)
Proc. ISCA
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.4
-
32
-
-
82655166365
-
SubVirt: Implementing malware with virtual machines
-
S. King, P. Chen, Y. Wang, C. Verbowski, H. Wang, and J. Lorch. SubVirt: Implementing malware with virtual machines. In Proc. S&P (Oakland), 2006.
-
Proc. S&P (Oakland), 2006
-
-
King, S.1
Chen, P.2
Wang, Y.3
Verbowski, C.4
Wang, H.5
Lorch, J.6
-
33
-
-
54049158076
-
kvm: The linux virtual machine monitor
-
A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. kvm: the linux virtual machine monitor. In Linux Symposium, 2007.
-
Linux Symposium, 2007
-
-
Kivity, A.1
Kamay, Y.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
34
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, et al. seL4: Formal verification of an OS kernel. In Proc. SOSP, pages 207-220, 2009.
-
(2009)
Proc. SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
-
35
-
-
84885608511
-
Make least privilege a right (not a privilege)
-
M. Krohn, P. Efstathopoulos, C. Frey, F. Kaashoek, E. Kohler, D. Mazieres, R. Morris, M. Osborne, S. VanDeBogart, and D. Ziegler. Make least privilege a right (not a privilege). In Proc. HotOS, 2005.
-
Proc. HotOS, 2005
-
-
Krohn, M.1
Efstathopoulos, P.2
Frey, C.3
Kaashoek, F.4
Kohler, E.5
Mazieres, D.6
Morris, R.7
Osborne, M.8
VanDeBogart, S.9
Ziegler, D.10
-
36
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proc. ASPLOS, pages 168-177, 2000.
-
(2000)
Proc. ASPLOS
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
37
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In Proc. SOSP, pages 178-192, 2003.
-
(2003)
Proc. SOSP
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
38
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In Proc. Eurosys, pages 315-328, 2008.
-
(2008)
Proc. Eurosys
, pp. 315-328
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
39
-
-
34548722186
-
Minimal TCB code execution
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and A. Seshadri. Minimal TCB code execution. In Proc. S&P (Oakland), pages 267-272, 2007.
-
(2007)
Proc. S&P (Oakland)
, pp. 267-272
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Seshadri, A.5
-
40
-
-
82655178735
-
TrustVisor: Efficient TCB Reduction and Attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proc. S&P (Oakland), 2010.
-
Proc. S&P (Oakland), 2010
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
44
-
-
77952329878
-
Improving Xen security through disaggregation
-
D. Murray, G. Milos, and S. Hand. Improving Xen security through disaggregation. In Proc. VEE, pages 151-160, 2008.
-
(2008)
Proc. VEE
, pp. 151-160
-
-
Murray, D.1
Milos, G.2
Hand, S.3
-
45
-
-
33846483949
-
Intel virtualization technology: Hardware support for efficient processor virtualization
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal, 10(3):167-177, 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 167-177
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
46
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. The eucalyptus open-source cloud-computing system. In Proc. CCGRID, pages 124-131, 2009.
-
(2009)
Proc. CCGRID
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
47
-
-
33646445517
-
NGSCB: A trusted open system
-
M. Peinado, Y. Chen, P. England, and J. Manferdelli. NGSCB: A trusted open system. In Information Security and Privacy, pages 86-97, 2004.
-
(2004)
Information Security and Privacy
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdelli, J.4
-
48
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Proc. RAID, pages 1-20, 2008.
-
(2008)
Proc. RAID, 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
49
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. CCS, pages 199-212. ACM, 2009.
-
(2009)
Proc. CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
50
-
-
34547941727
-
-
The official blog of the invisiblethings. org. June, 22
-
J. Rutkowska. Introducing Blue Pill. The official blog of the invisiblethings. org. June, 22, 2006.
-
(2006)
Introducing Blue Pill
-
-
Rutkowska, J.1
-
53
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proc. SOSP, 2007.
-
Proc. SOSP, 2007
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
54
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proc. SOSP, pages 1-16, 2005.
-
(2005)
Proc. SOSP
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
55
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. Van Doorn, and P. Khosla. SWATT: Software-based attestation for embedded devices. In Proc. S&P (Oakland), pages 272-282, 2004.
-
(2004)
Proc. S&P (Oakland)
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
56
-
-
85029200033
-
Limiting cache-based side-channel in multi-tenant cloud using dynamic page
-
J. Shi, X. Song, H. Chen, and B. Zang. Limiting cache-based side-channel in multi-tenant cloud using dynamic page. In Proc. HotDep, 2011.
-
Proc. HotDep, 2011
-
-
Shi, J.1
Song, X.2
Chen, H.3
Zang, B.4
-
57
-
-
67650079952
-
BitVisor: A thin hypervisor for enforcing i/o device security
-
ACM
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, et al. BitVisor: a thin hypervisor for enforcing i/o device security. In Proc. VEE, pages 121-130. ACM, 2009.
-
(2009)
Proc. VEE
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
-
59
-
-
82655166362
-
-
SPEC. Specjbb 2005. http://www.spec.org/jbb2005/, 2005.
-
(2005)
Specjbb 2005
-
-
-
60
-
-
77954565496
-
NOVA: A microhypervisor-based secure virtualization architecture
-
ACM
-
U. Steinberg and B. Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In Proc. Eurosys, pages 209-222. ACM, 2010.
-
(2010)
Proc. Eurosys
, pp. 209-222
-
-
Steinberg, U.1
Kauer, B.2
-
61
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. Suh, D. Clarke, B. Gassend, M. Van Dijk, and S. Devadas. AEGIS: architecture for tamper-evident and tamper-resistant processing. In Proc. Supercomputing, 2003.
-
Proc. Supercomputing, 2003
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
62
-
-
84872355901
-
-
T. R. Team
-
T. R. Team. Rackspace cloud. http://www.rackspacecloud.com/.
-
Rackspace Cloud
-
-
-
63
-
-
82655178723
-
Google fired employees for breaching user privacy
-
TechSpot News. Google fired employees for breaching user privacy. http://www.techspot.com/news/40280-google-fired-employees-for-breachinguser- privacy.html, 2010.
-
(2010)
TechSpot News
-
-
-
64
-
-
82655168168
-
-
The Nimbus Team
-
The Nimbus Team. Nimbus project. http://www.nimbusproject.org/.
-
-
-
-
66
-
-
84870630391
-
-
Trusted Computing Group. Trusted platform module. http://www. trustedcomputinggroup.org/, 2010.
-
(2010)
Trusted Platform Module
-
-
-
67
-
-
84978382687
-
Memory resource management in vmware esx server
-
C. A. Waldspurger. Memory resource management in vmware esx server. In Proc. OSDI, pages 181-194, 2002.
-
(2002)
Proc. OSDI
, pp. 181-194
-
-
Waldspurger, C.A.1
-
68
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proc. S&P (Oakland), pages 380-395, 2010.
-
(2010)
Proc. S&P (Oakland)
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
69
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
ACM
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proc. CCS, pages 545-554. ACM, 2009.
-
(2009)
Proc. CCS
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
70
-
-
82655169608
-
jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components
-
C. Weinhold and H. Härtig. jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components. In Proc. Usenix ATC, 2011.
-
Proc. Usenix ATC, 2011
-
-
Weinhold, C.1
Härtig, H.2
-
71
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
J. Yang and K. G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In Proc. VEE, pages 71-80, 2008.
-
(2008)
Proc. VEE
, pp. 71-80
-
-
Yang, J.1
Shin, K.G.2
-
72
-
-
77952337533
-
Hardware enforcement of application security policies using tagged memory
-
N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies using tagged memory. In Proc. OSDI, pages 225-240, 2008.
-
(2008)
Proc. OSDI
, pp. 225-240
-
-
Zeldovich, N.1
Kannan, H.2
Dalton, M.3
Kozyrakis, C.4
|