-
1
-
-
21644433634
-
Xen and the art of virtualization
-
ACM, New York
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 164-177. ACM, New York (2003)
-
(2003)
SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
0021122553
-
Software errors and complexity: An empirical investigation
-
Basili, V.R., Perricone, B.T.: Software errors and complexity: an empirical investigation. Commun. ACM 27, 42-52 (1984)
-
(1984)
Commun. ACM
, vol.27
, pp. 42-52
-
-
Basili, V.R.1
Perricone, B.T.2
-
3
-
-
82055183861
-
TruWalletM: SecureWeb Authentication onMobile Platforms
-
Chen, L., Yung, M. (eds.) INTRUST 2010. Springer, Heidelberg
-
Bugiel, S., Dmitrienko, A., Kostiainen, K., Sadeghi, A.-R., Winandy, M.: TruWalletM: SecureWeb Authentication onMobile Platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 219-236. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6802
, pp. 219-236
-
-
Bugiel, S.1
Dmitrienko, A.2
Kostiainen, K.3
Sadeghi, A.-R.4
Winandy, M.5
-
4
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Christopher Lewis, E., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008), Seattle, WA, USA (March 2008)
-
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008), Seattle, WA, USA (March 2008)
-
-
Chen, X.1
Garfinkel, T.2
Christopher Lewis, E.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
5
-
-
80052985363
-
DriverGuard: A Fine-Grained Protection on I/O Flows
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
Cheng, Y., Ding, X., Deng, R.H.: DriverGuard: A Fine-Grained Protection on I/O Flows. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 227-244. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 227-244
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
6
-
-
33751067472
-
A safety-oriented platform for web applications
-
Cox, R.S., Hansen, J.G., Gribble, S.D., Levy, H.M.: A safety-oriented platform for web applications. In: Proceedings of IEEE Symposium on Security and Privacy (2006)
-
Proceedings of IEEE Symposium on Security and Privacy (2006)
-
-
Cox, R.S.1
Hansen, J.G.2
Gribble, S.D.3
Levy, H.M.4
-
7
-
-
84863113387
-
-
CVE-2008-0923
-
CVE-2008-0923 (2008), http://cve.mitre.org/cgi-bin/cvename.cgi-?name=cve- 2008-0923
-
(2008)
-
-
-
8
-
-
74049088125
-
Truwallet: Trustworthy and migratable wallet-based web authentication
-
ACM, New York
-
Gajek, S., Löhr, H., Sadeghi, A.-R., Winandy, M.: Truwallet: trustworthy and migratable wallet-based web authentication. In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC 2009, pp. 19-28. ACM, New York (2009)
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009
, pp. 19-28
-
-
Gajek, S.1
Löhr, H.2
Sadeghi, A.-R.3
Winandy, M.4
-
11
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
IEEE Computer Society, Washington, DC
-
King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: Subvirt: Implementing malware with virtual machines. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 314-327. IEEE Computer Society, Washington, DC (2006)
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
12
-
-
84874279872
-
-
Sawtooth Consulting Limited
-
Sawtooth Consulting Limited. CyaSSL Embedded SSL Library, http://www.yassl.com/yaSSL/Products-cyassl.html
-
CyaSSL Embedded SSL Library
-
-
-
13
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
IEEE Computer Society, Washington, DC
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: Trustvisor: Efficient tcb reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 143-158. IEEE Computer Society, Washington, DC (2010)
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
14
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An execution infrastructure for TCB minimization. In: EuroSys 2008 (2008)
-
(2008)
EuroSys 2008
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
15
-
-
85077302433
-
Bump in the ether: A framework for securing sensitive user input
-
USENIX Association, Berkeley
-
McCune, J.M., Perrig, A., Reiter, M.K.: Bump in the ether: a framework for securing sensitive user input. In: Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference, p. 17. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference
, pp. 17
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
18
-
-
77952329878
-
Improving xen security through disaggregation
-
ACM, New York
-
Murray, D.G., Milos, G., Hand, S.: Improving xen security through disaggregation. In: Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2008, pp. 151-160. ACM, New York (2008)
-
(2008)
Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2008
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
19
-
-
21644455714
-
Securing a remote terminal application with a mobile trusted device
-
IEEE
-
Oprea, A., Balfanz, D., Durfee, G., Smetters, D.K.: Securing a remote terminal application with a mobile trusted device. In: 20th Annual Computer Security Applications Conference, pp. 438-447. IEEE (2004)
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 438-447
-
-
Oprea, A.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
20
-
-
0036986569
-
The distribution of faults in a large industrial software system
-
ACM, New York
-
Ostrand, T.J., Weyuker, E.J.: The distribution of faults in a large industrial software system. In: Proceedings of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2002, pp. 55-64. ACM, New York (2002)
-
(2002)
Proceedings of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2002
, pp. 55-64
-
-
Ostrand, T.J.1
Weyuker, E.J.2
-
22
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: Proceedings of the 14th USENIX Security Symposium (2005)
-
Proceedings of the 14th USENIX Security Symposium (2005)
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
23
-
-
84863109950
-
-
Limited Sawtooth, Consulting.
-
Limited Sawtooth, Consulting. Ctaocrypt embedded cryptography library, http://www.yassh.com/yaSSL/Docs-CTaoCrypt-Usage-Reference.html
-
Ctaocrypt Embedded Cryptography Library
-
-
-
24
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
ACM, New York
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 335-350. ACM, New York (2007)
-
(2007)
Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
25
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing i/o device security
-
ACM, New York
-
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y., Kato, K.: Bitvisor: a thin hypervisor for enforcing i/o device security. In: Proceedings of the 2009 ACM SIGPLAN/ SIGOPS International Conference on Virtual Execution Environments, VEE 2009, pp. 121-130. ACM, New York (2009)
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/ SIGOPS International Conference on Virtual Execution Environments, VEE 2009
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
26
-
-
77954565496
-
Nova: A microhypervisor-based secure virtualization architecture
-
ACM, New York
-
Steinberg, U., Kauer, B.: Nova: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys 2010, pp. 209-222. ACM, New York (2010)
-
(2010)
Proceedings of the 5th European Conference on Computer Systems, EuroSys 2010
, pp. 209-222
-
-
Steinberg, U.1
Kauer, B.2
-
27
-
-
84885945169
-
-
The Blue Pill, http://blackhat.com/presentations/bh-usa-06/BH-US-06- Rutkowska.pdf
-
The Blue Pill
-
-
-
28
-
-
77952371831
-
-
Trusted Computing Group Version 1.2 rev. 85 February
-
Trusted Computing Group. TPM main specification. Main Specification Version 1.2 rev. 85 (February 2005)
-
(2005)
TPM Main Specification. Main Specification
-
-
-
29
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
ACM Press
-
Wu, M., Miller, R.C., Little, G.: Web wallet: Preventing phishing attacks by revealing user intentions. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS), pp. 102-113. ACM Press (2006)
-
(2006)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
30
-
-
84863109951
-
-
Technical report January
-
Zaharia, M., Katti, S., Grier, C., Paxson, V., Shenker, S., Stoica, I., Song, D.: Hypervisors as a foothold for personal computer security: An agenda for the research community. Technical report (January 2012)
-
(2012)
Hypervisors As A Foothold for Personal Computer Security: An Agenda for the Research Community
-
-
Zaharia, M.1
Katti, S.2
Grier, C.3
Paxson, V.4
Shenker, S.5
Stoica, I.6
Song, D.7
|