-
1
-
-
84858781462
-
-
Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/.
-
-
-
-
2
-
-
84858787776
-
-
AMD Virtualization (AMD-V) Technology. http://sites.amd.com/us/business/ it-solutions/virtualization/Pages/amd-v.aspx.
-
-
-
-
5
-
-
84858779456
-
-
Intel Virtualization Technology, . http://www.intel.com/technology/itj/ 2006/v10i3/1-hardware/6-vt-x-vt-i-solutions.htm.
-
-
-
-
10
-
-
84858779455
-
-
Oracle VM Server For SPARC. http://www.oracle.com/us/oraclevm-sparc-ds- 073441.pdf.
-
-
-
-
11
-
-
77954408441
-
-
Trusted Computing Group. TCG TPM Specification. http://www. trustedcomputinggroup.org/.
-
TCG TPM Specification
-
-
-
12
-
-
84858787777
-
-
VMWare. http://www.vmware.com/.
-
-
-
-
14
-
-
84858779453
-
-
Xen. http://www.xen.org.
-
-
-
-
15
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
October doi: http://doi.acm.org/10.1145/1866307.1866313
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proc. of the 17th ACM Conference on Computer and Communications Security, CCS, pages 38-49, October 2010. doi: http://doi.acm.org/10.1145/1866307.1866313. URL http://doi.acm.org/10.1145/1866307.1866313.
-
(2010)
Proc. of the 17th ACM Conference on Computer and Communications Security, CCS
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
16
-
-
82655178636
-
The turtles project: Design and implementation of nested virtualization
-
October
-
M. Ben-Yehuda, M. D. Day, Z. Dubitzky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B.-A. Yassour. The turtles project: design and implementation of nested virtualization. In Proc. of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI, pages 1-6, October 2010. URL http://portal.acm.org/citation.cfm?id=1924943.1924973.
-
(2010)
Proc. of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI
, pp. 1-6
-
-
Ben-Yehuda, M.1
Day, M.D.2
Dubitzky, Z.3
Factor, M.4
Har'El, N.5
Gordon, A.6
Liguori, A.7
Wasserman, O.8
Yassour, B.-A.9
-
17
-
-
14844295011
-
Direct anonymous attestation
-
October ISBN 1-58113-961-6. doi: http://doi.acm.org/10.1145/1030083. 1030103
-
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In Proc. of the 11th ACM Conference on Computer and Communications Security, CCS, pages 132-145, October 2004. ISBN 1-58113-961-6. doi: http://doi.acm.org/10. 1145/1030083.1030103. URL http://doi.acm.org/10.1145/1030083.1030103.
-
(2004)
Proc. of the 11th ACM Conference on Computer and Communications Security, CCS
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
20
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
March ISBN 978-1-59593-958-6. doi: http://doi.acm.org/10.1145/1346281. 1346284
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proc. of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, pages 2-13, March 2008. ISBN 978-1-59593-958-6. doi: http://doi.acm.org/10.1145/1346281.1346284. URL http://doi.acm.org/10.1145/1346281.1346284.
-
(2008)
Proc. of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
21
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
May ISBN 978-1-60558-506-2. doi: http: //doi.acm.org/10.1145/1536414. 1536440
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In Proc. of the annual Symposium on Theory of Computing, STOC, pages 169-178, May 2009. ISBN 978-1-60558-506-2. doi: http: //doi.acm.org/10.1145/1536414.1536440. URL http://doi.acm.org/10.1145/1536414.1536440.
-
(2009)
Proc. of the Annual Symposium on Theory of Computing, STOC
, pp. 169-178
-
-
Gentry, C.1
-
23
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
June ISBN 978-1-4503-0053-7
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proc. of the 37th annual International Symposium on Computer Architecture, ISCA, pages 350-361, June 2010. ISBN 978-1-4503-0053-7.
-
(2010)
Proc. of the 37th Annual International Symposium on Computer Architecture, ISCA
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
24
-
-
67650146012
-
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
-
Information Security and Cryptology
-
M. Kim, J. Ryou, and S. Jun. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. In Information Security and Cryptology, volume 5487 of Lecture Notes in Computer Science, pages 240-252. 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5487
, pp. 240-252
-
-
Kim, M.1
Ryou, J.2
Jun, S.3
-
25
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
October ISBN 978-1-60558-752-3. doi
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In Proc. of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP, pages 207-220, October 2009. ISBN 978-1-60558-752-3. doi: http://doi.acm.org/10.1145/1629575.1629596.
-
(2009)
Proc. of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
26
-
-
77954729866
-
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
-
Trust and Trustworthy Computing
-
F. Krautheim, D. Phatak, and A. Sherman. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In Trust and Trustworthy Computing, volume 6101 of Lecture Notes in Computer Science, pages 211-227. 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6101
, pp. 211-227
-
-
Krautheim, F.1
Phatak, D.2
Sherman, A.3
-
29
-
-
27544511310
-
Architecture for Protecting Critical Secrets in Microprocessors
-
June
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for Protecting Critical Secrets in Microprocessors. In Proc. of the 32nd annual International Symposium on Computer Architecture, ISCA, pages 2-13, June 2005.
-
(2005)
Proc. of the 32nd Annual International Symposium on Computer Architecture, ISCA
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
30
-
-
38549136062
-
Iteration bound analysis and throughput optimum architecture of SHA-256 (384, 512) for hardware implementations
-
Information Security Applications - 8th International Workshop, WISA 2007, Revised Selected Papers
-
Y. Lee, H. Chan, and I. Verbauwhede. Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations. In S. Kim, M. Yung, and H.-W. Lee, editors, Information Security Applications, volume 4867 of Lecture Notes in Computer Science, pages 102-114. 2007. (Pubitemid 351153978)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4867 LNCS
, pp. 102-114
-
-
Lee, Y.K.1
Chan, H.2
Verbauwhede, I.3
-
32
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proc. of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, November 2000.
-
Proc. of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, November 2000
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
33
-
-
72949120122
-
KvmSec: A security extension for Linux kernel virtual machines
-
March ISBN 978-1-60558-166-8. doi
-
F. Lombardi and R. Di Pietro. KvmSec: a security extension for Linux kernel virtual machines. In Proc. of the 2009 ACM Symposium on Applied Computing, SAC, pages 2029-2034, March 2009. ISBN 978-1-60558-166-8. doi: http://doi.acm.org/10.1145/1529282.1529733.
-
(2009)
Proc. of the 2009 ACM Symposium on Applied Computing, SAC
, pp. 2029-2034
-
-
Lombardi, F.1
Di Pietro, R.2
-
35
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
March ISBN 978-1-60558-013-5. doi: http://doi.acm.org/10.1145/1352592. 1352625
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. In Proc. of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, EuroSys, pages 315-328, March 2008. ISBN 978-1-60558-013-5. doi: http://doi.acm.org/10.1145/ 1352592.1352625. URL http://doi.acm.org/10.1145/1352592.1352625.
-
(2008)
Proc. of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, EuroSys
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
36
-
-
79959706339
-
Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers
-
ISSN 1063-8210. doi: 10.1109/TVLSI.2010.2049037
-
A. Miyamoto, N. Homma, T. Aoki, and A. Satoh. Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, (99):1-11, 2010. ISSN 1063-8210. doi: 10.1109/TVLSI.2010.2049037.
-
(2010)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, Issue.99
, pp. 1-11
-
-
Miyamoto, A.1
Homma, N.2
Aoki, T.3
Satoh, A.4
-
37
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Nov. ISBN 978-1-60558-894-0
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. of the conference on Computer and Communications Security, CCS, pages 199-212, Nov. 2009. ISBN 978-1-60558-894-0.
-
(2009)
Proc. of the Conference on Computer and Communications Security, CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
39
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
June ISBN 1-58113-733-8. doi: http://doi.acm.org/10.1145/782814.782838
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: architecture for tamper-evident and tamper-resistant processing. In Proc. of the 17th annual International Conference on Supercomputing, ICS, pages 160-171, June 2003. ISBN 1-58113-733-8. doi: http://doi.acm.org/10.1145/782814.782838. URL http://doi.acm.org/10.1145/782814.782838.
-
(2003)
Proc. of the 17th Annual International Conference on Supercomputing, ICS
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
42
-
-
77954726625
-
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
-
June ISBN 3-642-13868-3, 978-3-642-13868-3
-
A. Vasudevan, J. M. McCune, N. Qu, L. Van Doorn, and A. Perrig. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture. In Proc. of the 3rd international conference on Trust and Trustworthy Computing, TRUST, pages 141-165, June 2010. ISBN 3-642-13868-3, 978-3-642-13868-3. URL http://portal.acm.org/citation.cfm?id=1875652.1875663.
-
(2010)
Proc. of the 3rd International Conference on Trust and Trustworthy Computing, TRUST
, pp. 141-165
-
-
Vasudevan, A.1
McCune, J.M.2
Qu, N.3
Van Doorn, L.4
Perrig, A.5
-
43
-
-
84978382687
-
Memory resource management in VMware ESX server
-
December ISSN 0163-5980. doi: http://doi.acm.org/10.1145/844128.844146
-
C. A. Waldspurger. Memory resource management in VMware ESX server. SIGOPS Oper. Syst. Rev., 36:181-194, December 2002. ISSN 0163-5980. doi: http://doi.acm.org/10.1145/844128.844146. URL http://doi.acm.org/10.1145/844128. 844146.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 181-194
-
-
Waldspurger, C.A.1
-
44
-
-
77955212682
-
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
-
May doi: 10.1109/SP.2010.30
-
Z. Wang and X. Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In Proc. of the 2010 IEEE Symposium on Security and Privacy, S&P, pages 380 -395, May 2010. doi: 10.1109/SP.2010.30.
-
(2010)
Proc. of the 2010 IEEE Symposium on Security and Privacy, S&P
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
46
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Nov. ISBN 978-1-60558-894-0. doi
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proc. of the conference on Computer and Communications Security, CCS, pages 545-554, Nov. 2009. ISBN 978-1-60558-894-0. doi: http://doi.acm.org/10.1145/1653662.1653728.
-
(2009)
Proc. of the Conference on Computer and Communications Security, CCS
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|