-
4
-
-
21644433634
-
Xen and the art of virtualization
-
Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pages 164–177, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
84943385246
-
The transmeta code morphing™software: Using speculation, recovery, and adaptive retranslation to address real-life challenges
-
Mar
-
J. C. Dehnert, B. K. Grant, J. P. Banning, R. Johnson, T. Kistler, A. Klaiber, and J. Mattson. The Transmeta Code Morphing™software: using speculation, recovery, and adaptive retranslation to address real-life challenges. In Proceedings of the International Symposium on Code Generation and Optimization (CGO), pages 15–24, Mar. 2003.
-
(2003)
Proceedings of the International Symposium on Code Generation and Optimization (CGO)
, pp. 15-24
-
-
Dehnert, J.C.1
Grant, B.K.2
Banning, J.P.3
Johnson, R.4
Kistler, T.5
Klaiber, A.6
Mattson, J.7
-
9
-
-
21644455412
-
TerrA: A virtual machine-based platform for trusted computing
-
Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pages 193–206, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
16
-
-
0025137215
-
A VMM security kernel for the VAX architecture
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A VMM security kernel for the VAX architecture. In Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 2–19, 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Security and Privacy
, pp. 2-19
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
22
-
-
85077677815
-
-
PaX, 2008. http://pax.grsecurity.net
-
PaX, 2008. http://pax.grsecurity.net/.
-
-
-
-
23
-
-
85084162914
-
Copilot–a coprocessor-based kernel runtime integrity monitor
-
Aug
-
N. L. Petroni Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot–a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium, pages 179–194, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
24
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
July
-
N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proceedings of the 15th USENIX Security Symposium, pages 289–304, July 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 289-304
-
-
Petroni, N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
26
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
Dec
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), pages 289–300, Dec. 2006.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC)
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
29
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223–238, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
30
-
-
77952284901
-
-
Apr
-
A. Schuster. Reconstructing a binary, Apr. 2006. http://computer.forensikblog.de/en/2006/04/reconstructing a binary.html.
-
(2006)
Reconstructing A Binary
-
-
Schuster, A.1
-
34
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
Apr.-June
-
P. C. van Oorschot, A. Somayaji, and G. Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. IEEE Transactions on Dependable and Secure Computing, 2(2):82–92, Apr.-June 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 82-92
-
-
van Oorschot, P.C.1
Somayaji, A.2
Wurster, G.3
|