-
4
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds.
-
AZAB, A. M., NING, P., WANG, Z., JIANG, X., ZHANG, X., AND SKALSKY, N. C. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In 17th ACM Conference on Computer and Communications Security, 2010, E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds., pp. 38-49.
-
17th ACM Conference on Computer and Communications Security, 2010
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
5
-
-
35448929044
-
Certified self-modifying code
-
CAI, H., SHAO, Z., AND VAYNBERG, A. Certified self-modifying code. In Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation, PLDI '07, pp. 66-77.
-
Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '07
, pp. 66-77
-
-
Cai, H.1
Shao, Z.2
Vaynberg, A.3
-
8
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
ACM
-
EFSTATHOPOULOS, P., KROHN, M., VANDEBOGART, S., FREY, C., ZIEGLER, D., KOHLER, E., MAZIÈRES, D., KAASHOEK, F., AND MORRIS, R. Labels and event processes in the asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'07) (Brighton, UK, Oct. 2005), ACM, pp. 17-30.
-
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'07) (Brighton, UK, Oct. 2005)
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
Vandebogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
9
-
-
84883516225
-
J. Exokernel: An operating system architecture for application-level resource management
-
ENGLER, D. R., KAASHOEK, M. F., AND O'TOOLE, JR., J. Exokernel: an operating system architecture for application-level resource management. In Proceedings of the fifteenth ACM symposium on Operating systems principles, SOSP '95, pp. 251-266.
-
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, SOSP '95
, pp. 251-266
-
-
Engler, D.R.1
Kaashoek, M.F.2
O'Toole, J.R.3
-
11
-
-
57349187893
-
Certifying low-level programs with hardware interrupts and preemptive threads
-
FENG, X., SHAO, Z., DONG, Y., AND GUO, Y. Certifying low-level programs with hardware interrupts and preemptive threads. In Proceedings of the 2008 ACM SIGPLAN conference on Programming language design and implementation, PLDI '08, pp. 170-182.
-
Proceedings of the 2008 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '08
, pp. 170-182
-
-
Feng, X.1
Shao, Z.2
Dong, Y.3
Guo, Y.4
-
12
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pp. 193-206.
-
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
13
-
-
33745212805
-
-
Tech. Rep. MSR-TR-2005-135, Microsoft Research, Redmond, WA, USA, Oct.
-
HUNT, G. C., LARUS, J. R., ABADI, M., AIKEN, M., BARHAM, P., FAHNDRICH, M., HAWBLITZEL, C., HODSON, O., LEVI, S., MURPHY, N., STEENSGAARD, B., TARDITI, D., WOBBER, T., AND ZILL, B. An overview of the Singularity project. Tech. Rep. MSR-TR-2005-135, Microsoft Research, Redmond, WA, USA, Oct. 2005.
-
(2005)
An Overview of the Singularity Project
-
-
Hunt, G.C.1
Larus, J.R.2
Abadi, M.3
Aiken, M.4
Barham, P.5
Fahndrich, M.6
Hawblitzel, C.7
Hodson, O.8
Levi, S.9
Murphy, N.10
Steensgaard, B.11
Tarditi, D.12
Wobber, T.13
Zill, B.14
-
14
-
-
77954969841
-
Virtualized cloud infrastructure without the virtualization
-
ACM SIGARCH
-
KELLER, E., SZEFER, J., REXFORD, J., AND LEE, R. B. Nohype: Virtualized cloud infrastructure without the virtualization. In Proc. 37th International Symposium on Computer Architecture (37th ISCA'10) (Saint-Malo, France, June 2010), ACM SIGARCH, pp. 350-361.
-
Proc. 37th International Symposium on Computer Architecture (37th ISCA'10) (Saint-Malo, France, June 2010)
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.N.4
-
15
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
ACM SIGOPS
-
KLEIN, G., ELPHINSTONE, K., HEISER, G., ANDRONICK, J., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., AND WINWOOD, S. seL4: Formal verification of an OS kernel. In Proceedings of the 22nd Symposium on Operating Systems Principles (22nd SOSP'09), Operating Systems Review (OSR) (Big Sky, MT, Oct. 2009), ACM SIGOPS, pp. 207-220.
-
Proceedings of the 22nd Symposium on Operating Systems Principles (22nd SOSP'09), Operating Systems Review (OSR) (Big Sky, MT, Oct. 2009)
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
16
-
-
57749192483
-
Information flow control for standard os abstractions
-
KROHN, M. N., YIP, A., BRODSKY, M. Z., CLIFFER, N., KAASHOEK, M. F., KOHLER, E., AND MORRIS, R. Information flow control for standard os abstractions. In SOSP (2007), pp. 321-334.
-
(2007)
SOSP
, pp. 321-334
-
-
Krohn, M.N.1
Yip, A.2
Brodsky, M.Z.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
17
-
-
0031543270
-
A decentralized model for information flow control
-
MYERS, A. C., AND LISKOV, B. A decentralized model for information flow control. In SOSP (1997), pp. 129-142.
-
(1997)
SOSP
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
18
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
REYNOLDS, J. C. Separation logic: A logic for shared mutable data structures. In LICS (2002), pp. 55-74.
-
(2002)
LICS
, pp. 55-74
-
-
Reynolds, J.C.1
-
19
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp. 199-212.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
20
-
-
70350548311
-
Declassification: Dimensions and principles
-
SABELFELD, A., AND SANDS, D. Declassification: Dimensions and principles. Journal of Computer Security 17, 5 (2009), 517-548.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.5
, pp. 517-548
-
-
Sabelfeld, A.1
Sands, D.2
-
21
-
-
33750248123
-
Building a mac-based security architecture for the xen open-source hypervisor
-
SAILER, R., JAEGER, T., VALDEZ, E., CACERES, R., PEREZ, R., BERGER, S., GRIFFIN, J. L., AND DOORN, L. V. Building a mac-based security architecture for the xen open-source hypervisor. In Proceedings of the 21st Annual Computer Security Applications Conference (2005), pp. 276-285.
-
Proceedings of the 21st Annual Computer Security Applications Conference (2005)
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Doorn, L.V.8
-
22
-
-
84929445167
-
Towards trusted cloud computing
-
SANTOS, N., GUMMADI, K. P., AND RODRIGUES, R. Towards trusted cloud computing. In Proceedings of the conference on Hot topics in cloud computing, HotCloud'09, pp. 3-3.
-
Proceedings of the Conference on Hot Topics in Cloud Computing, HotCloud'09
, pp. 3-3
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
23
-
-
78650093272
-
Certified software
-
December
-
SHAO, Z. Certified software. Commun. ACM 53 (December 2010), 56-66.
-
(2010)
Commun. ACM
, vol.53
, pp. 56-66
-
-
Shao, Z.1
-
24
-
-
77952371831
-
-
Feb.
-
TRUSTED COMPUTING GROUP. TPM main specification. http://www. trustedcomputinggroup.org, Feb. 2005.
-
(2005)
TPM Main Specification
-
-
-
26
-
-
67249098186
-
Subverting the Xen hypervisor
-
WOJTCZUK, R. Subverting the Xen hypervisor. In Blackhat (2008).http://www.invisiblethingslab.com/resources/bh08/part1.pdf.
-
(2008)
Blackhat
-
-
Wojtczuk, R.1
-
27
-
-
1442335816
-
Building certified libraries for pcc: Dynamic storage allocation
-
March
-
YU, D., HAMID, N. A., AND SHAO, Z. Building certified libraries for pcc: dynamic storage allocation. Sci. Comput. Program. 50 (March 2004), 101-127.
-
(2004)
Sci. Comput. Program.
, vol.50
, pp. 101-127
-
-
Yu, D.1
Hamid, N.A.2
Shao, Z.3
-
28
-
-
84888352157
-
Making information flow explicit in HiStar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. Making information flow explicit in HiStar. In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (Nov. 2006).
-
Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (Nov. 2006)
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|