-
3
-
-
84858782206
-
-
Advanced Micro Dvices. System Programming
-
Advanced Micro Dvices. AMD64 Architecture Programmer's Mannual: Volume 2: System Programming, 2007.
-
(2007)
AMD64 Architecture Programmer's Mannual
, vol.2
-
-
-
4
-
-
77952558128
-
-
Advanced Micro Dvices.
-
Advanced Micro Dvices. AMD-V Nested Paging, 2008.
-
(2008)
AMD-V Nested Paging
-
-
-
6
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices
-
Security Protocols: 5th International Workshop
-
R. Anderson and M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. In Security Protocols: 5th International Workshop, LNCS, pages 125-136, 1997.
-
(1997)
LNCS
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
7
-
-
77950820630
-
HIMA: A Hypervisor-Based Integrity Measurement Agent
-
A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang. HIMA: A Hypervisor-Based Integrity Measurement Agent. In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pages 461-470.
-
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009
, pp. 461-470
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
Zhang, X.4
-
8
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of th 17th ACM Conference on Computer and Communications Security, CCS 2010, pages 38-49.
-
Proceedings of Th 17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
11
-
-
77957810674
-
Overshadow: A Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: a Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008, pages 2-13.
-
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
14
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, SOSP 2003, pages 193-206.
-
Proceedings of the 19th ACM Symposium on Operating Systems Principles, SOSP 2003
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
15
-
-
85076898936
-
Difference Engine: Harnessing Memory Redundancy in Virtual Machines
-
D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference Engine: Harnessing Memory Redundancy in Virtual Machines. In Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, pages 309-322, 2008.
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08
, pp. 309-322
-
-
Gupta, D.1
Lee, S.2
Vrable, M.3
Savage, S.4
Snoeren, A.C.5
Varghese, G.6
Voelker, G.M.7
Vahdat, A.8
-
16
-
-
43749085907
-
eCryptfs: An Enterprise-class Cryptographic Filesystem for Linux
-
M. A. Halcrow. eCryptfs: An Enterprise-class Cryptographic Filesystem for Linux. In Proceedings of the Linux Symposium, Linux 05, pages 201-218.
-
Proceedings of the Linux Symposium, Linux 05
, pp. 201-218
-
-
Halcrow, M.A.1
-
17
-
-
66149173689
-
Lest We Remember: Cold-boot Attacks on Encryption Keys
-
May
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest We Remember: Cold-boot Attacks on Encryption Keys. Commun. ACM, 52:91-98, May 2009.
-
(2009)
Commun. ACM
, vol.52
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
22
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proceedings of the 37th annual international symposium on Computer architecture, ISCA 2010, pages 350-361.
-
Proceedings of the 37th Annual International Symposium on Computer Architecture, ISCA 2010
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
24
-
-
27544511310
-
Architecture for Protecting Critical Secrets in Microprocessors
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for Protecting Critical Secrets in Microprocessors. In Proceedings of the 32nd annual international symposium on Computer Architecture, ISCA 2005, pages 2-13.
-
Proceedings of the 32nd Annual International Symposium on Computer Architecture, ISCA 2005
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
26
-
-
0039927533
-
Architectural Support for Copy and Tamper Resistant Software
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, ASPLOS 2000, pages 168-177.
-
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2000
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
27
-
-
77955186544
-
TrustVisor: Efficient TCB Reduction and Attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. D. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, S&P 2010, pages 143-158.
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy, S&P 2010
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
29
-
-
85027970456
-
Satori: Enlightened Page Sharing
-
G. Miłós, D. G. Murray, S. Hand, and M. A. Fetterman. Satori: Enlightened Page Sharing. In Proceedings of the 2009 conference on USENIX Annual technical conference, USENIX'09, 2009.
-
Proceedings of the 2009 Conference on USENIX Annual Technical Conference, USENIX'09, 2009
-
-
Miłós, G.1
Murray, D.G.2
Hand, S.3
Fetterman, M.A.4
-
31
-
-
33846483949
-
Intel Virtualization Technology: Hardware Support for Effcient Processor Virtualization
-
G. Neiger, A. Santoni, F. Leung, D. Rodger, and R. Uhlig. Intel Virtualization Technology: Hardware Support for Effcient Processor Virtualization. Intel Technology Journal, 10(03):167-178, 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 167-178
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodger, D.4
Uhlig, R.5
-
32
-
-
33745640963
-
Cache Attacks and Countermeasures: The Case of AES
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: the Case of AES. In RSA Conference Cryptographers Track, CT-RSA 2006, pages 1-20, 2005.
-
(2005)
RSA Conference Cryptographers Track, CT-RSA 2006
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
33
-
-
1942441379
-
Defending against cache-based side-channel attacks
-
March
-
D. Page. Defending against cache-based side-channel attacks. Information Security Technical Report, 8:30-44, March 2003.
-
(2003)
Information Security Technical Report
, vol.8
, pp. 30-44
-
-
Page, D.1
-
34
-
-
84858755787
-
Storage-Based Intrusion Detection
-
A. G. Pennington, J. L. Griffin, J. S. Bucy, J. D. Strunk, and G. R. Ganger. Storage-Based Intrusion Detection. ACM Transactions on Information and System Security, 36(7):18-29, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.36
, Issue.7
, pp. 18-29
-
-
Pennington, A.G.1
Griffin, J.L.2
Bucy, J.S.3
Strunk, J.D.4
Ganger, G.R.5
-
35
-
-
84858774573
-
-
RUBiS Benchmark. http://rubis.ow2.org, 2008.
-
(2008)
RUBiS Benchmark
-
-
-
39
-
-
1142280988
-
AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing. In Proceedings of the 2003 International Conference on Supercomputing, ICS 2003, pages 160-171.
-
Proceedings of the 2003 International Conference on Supercomputing, ICS 2003
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
42
-
-
84870630391
-
-
Trusted Platform Module. http://www.trustedcomputinggroup.org/developers/ trusted-platform-module%.
-
Trusted Platform Module
-
-
-
43
-
-
80052168599
-
-
VMware ESX and ESXi. http://www.vmware.com/products/vsphere/esxi-and-esx/ index.html, 2010.
-
(2010)
VMware ESX and ESXi
-
-
-
44
-
-
84942431284
-
-
VolanoMark. http://www.volano.com/benchmark, 2009.
-
(2009)
VolanoMark
-
-
-
45
-
-
84978382687
-
Memory Resource Management in VMware ESX Server
-
New York, NY, USA, ACM
-
C. A. Waldspurger. Memory Resource Management in VMware ESX Server. In Proceedings of the 5th symposium on Operating systems design and implementation, OSDI'02, pages 181-194, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation, OSDI'02
, pp. 181-194
-
-
Waldspurger, C.A.1
-
46
-
-
77955212682
-
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
-
Z. Wang and X. Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In IEEE Symposium on Security and Privacy, S&P 2010, pages 380-395.
-
IEEE Symposium on Security and Privacy, S&P 2010
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
47
-
-
35348816106
-
New Cache Designs for Thwarting Software Cache-based Side Channel Attacks
-
May
-
Z. Wang and R. B. Lee. New Cache Designs for Thwarting Software Cache-based Side Channel Attacks. ACM SIGARCH Computer Architecture News, 35:494-505, May 2007.
-
(2007)
ACM SIGARCH Computer Architecture News
, vol.35
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
48
-
-
78649988138
-
-
Windows Azure Platform. http://www.microsoft.com/windowsazure/, 2010.
-
(2010)
Windows Azure Platform
-
-
-
49
-
-
84858779014
-
-
Xen Hypervisor. http://www.xen.org/, 2010.
-
(2010)
Xen Hypervisor
-
-
-
51
-
-
77952337533
-
Hardware Enforcement of Application Security Policies Using Tagged Memory
-
N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware Enforcement of Application Security Policies Using Tagged Memory. In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, pages 225-240.
-
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008
, pp. 225-240
-
-
Zeldovich, N.1
Kannan, H.2
Dalton, M.3
Kozyrakis, C.4
|