-
1
-
-
84885885930
-
-
Trusted Computing Group: Tpm main specification, http://www. trustedcomputinggroup.org/
-
-
-
-
3
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Comput. Networks 31(8), 831-860 (1999)
-
(1999)
Comput. Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.1
Weingart, S.2
-
4
-
-
85092890026
-
Certifying program execution with secure processors
-
Chen, B., Morris, R.: Certifying program execution with secure processors. In: USENIX HotOS Workshop, pp. 133-138 (2003)
-
(2003)
USENIX HotOS Workshop
, pp. 133-138
-
-
Chen, B.1
Morris, R.2
-
5
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
ACM, New York
-
Singaravelu, L., Pu, C., Härtig, H., Helmuth, C.: Reducing TCB complexity for security-sensitive applications: Three case studies. In: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006. ACM, New York (2006)
-
(2006)
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
6
-
-
85077706009
-
OSLO: Improving the security of trusted computing
-
USENIX Association
-
Kauer, B.: OSLO: improving the security of trusted computing. In: Proceedings of 16th USENIX Security Symposium, pp. 1-9. USENIX Association (2007)
-
(2007)
Proceedings of 16th USENIX Security Symposium
, pp. 1-9
-
-
Kauer, B.1
-
7
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
ACM, New York
-
McCune, J., Parno, B., Perrig, A., Reiter, M., Isozaki, H.: Flicker: An execution infrastructure for TCB minimization. In: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008. ACM, New York (2008)
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
9
-
-
84885887315
-
Aleph1: Smashing the stack for fun and profit
-
Aleph1: Smashing the stack for fun and profit. Phrack 49 (1996)
-
(1996)
Phrack
, vol.49
-
-
-
10
-
-
38849147719
-
Code injection in c and c++: A survey of vulnerabilities and countermeasures
-
Katholieke Universiteit Leuven
-
Younan, Y., Joosen, W., Piessens, F.: Code injection in c and c++: A survey of vulnerabilities and countermeasures. Technical report, Departement Computer-wetenschappen, Katholieke Universiteit Leuven (2004)
-
(2004)
Technical Report, Departement Computer-wetenschappen
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
11
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
Halderman, J., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Appelbaum, J., Felten, E.: Lest we remember: Cold boot attacks on encryption keys. In: USENIX Security Symposium, pp. 45-60 (2008)
-
(2008)
USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.1
Schoen, S.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.7
Appelbaum, J.8
Felten, E.9
-
12
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
Longley, D., Rigby, S.: An automatic search for security flaws in key management schemes. Computers & Security 11(1), 75-89 (1992)
-
(1992)
Computers & Security
, vol.11
, Issue.1
, pp. 75-89
-
-
Longley, D.1
Rigby, S.2
-
13
-
-
70349100695
-
Breaking the memory secrecy assumption
-
ACM, New York March
-
Strackx, R., Younan, Y., Philippaerts, P., Piessens, F., Lachmund, S., Walter, T.: Breaking the memory secrecy assumption. In: EUROSEC 2009: Proceedings of the Second European Workshop on System Security, pp. 1-8. ACM, New York (March 2009)
-
(2009)
EUROSEC 2009: Proceedings of the Second European Workshop on System Security
, pp. 1-8
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
14
-
-
38049035512
-
Low-level software security: Attacks and defenses
-
Aldini, A., Gorrieri, R. (eds.) LNCS Springer, Heidelberg
-
Erlingsson, Ú.: Low-level software security: Attacks and defenses. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 92-134. Springer, Heidelberg (2007)
-
(2007)
FOSAD 2007
, vol.4677
, pp. 92-134
-
-
Erlingsson, U.1
-
16
-
-
84885890226
-
-
The PaX Team: Documentation for the pax project, http://pax.grsecurity. net/docs/pax.txt
-
-
-
-
17
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
ACM, New York
-
Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM conference on Computer and communications security, p. 561. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 561
-
-
Shacham, H.1
-
18
-
-
85060818077
-
Introduction and overview of the multics system
-
November 30-December 1 ACM, New York
-
Corbato, F., Vyssotsky, V.: Introduction and overview of the Multics system. In: Proceedings of the fall joint computer conference, part I, November 30-December 1, pp. 185-196. ACM, New York (1965)
-
(1965)
Proceedings of the Fall Joint Computer Conference, Part I
, pp. 185-196
-
-
Corbato, F.1
Vyssotsky, V.2
|