-
1
-
-
77950820630
-
Hima: A hypervisor-based integrity measurement agent
-
A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang. Hima: A hypervisor-based integrity measurement agent. In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09, pages 461-470, 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09
, pp. 461-470
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
Zhang, X.4
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pages 164-177, 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
80053150585
-
-
BitLocker Drive Encryption. http://windows.microsoft.com/en- US/windows7/products/features/bitlocker.
-
BitLocker Drive Encryption
-
-
-
6
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for unix
-
Berkeley, CA, USA, USENIX Association
-
G. Cattaneo, L. Catuogno, A. D. Sorbo, and P. Persiano. The design and implementation of a transparent cryptographic file system for unix. In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pages 199-212, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
, pp. 199-212
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
7
-
-
84863569316
-
-
release 1.1, January
-
CE-Infosys. Compusec release 1.1, January 2003.
-
(2003)
CE-Infosys. Compusec
-
-
-
10
-
-
84863576208
-
-
Futuremark Corporation. November
-
Futuremark Corporation. PCMark Vantage Whitepaper v1.0, November 2007.
-
(2007)
PCMark Vantage Whitepaper V1.0
-
-
-
11
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pages 193-206, 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
12
-
-
70449709794
-
Virtualization with kvm
-
February
-
I. Habib. Virtualization with kvm. Linux J., 2008, February 2008.
-
(2008)
Linux J.
, vol.2008
-
-
Habib, I.1
-
13
-
-
34447519122
-
Discryption: Internal Hard-Disk Encryption for Secure Storage
-
L. Hars. Discryption: Internal Hard-Disk Encryption for Secure Storage. Computer, 40:103-105, 2007.
-
(2007)
Computer
, vol.40
, pp. 103-105
-
-
Hars, L.1
-
15
-
-
77949441598
-
Stealthy malware detection and monitoring through vmm-based "gout-of-the-box" semantic view reconstruction
-
March
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection and monitoring through vmm-based "gout-of-the-box" semantic view reconstruction. ACM Trans. Inf. Syst. Secur., 13:12:1-12:28, March 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
16
-
-
35048889770
-
Gbde-geom based disk encryption
-
P. H. Kamp. Gbde-geom based disk encryption. BSDCon 2003, 2003.
-
(2003)
BSDCon 2003
-
-
Kamp, P.H.1
-
18
-
-
70449689649
-
Taking a Hard-Line Approach to Encryption
-
C. Laird. Taking a Hard-Line Approach to Encryption. Computer, 40:13-15, 2007.
-
(2007)
Computer
, vol.40
, pp. 13-15
-
-
Laird, C.1
-
23
-
-
84863576372
-
-
Moka5. http://www.moka5.com/.
-
-
-
-
24
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 233-247, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
25
-
-
79951490425
-
Tcvisor: A hypervisor level secure storage
-
December
-
M. Rezaei, N. Moosavi, H. Nemati, and R. Azmi. Tcvisor: A hypervisor level secure storage. In Internet Technology and Secured Transactions (ICITST), 2010 International Conference, pages 1-9, December 2010.
-
(2010)
Internet Technology and Secured Transactions (ICITST), 2010 International Conference
, pp. 1-9
-
-
Rezaei, M.1
Moosavi, N.2
Nemati, H.3
Azmi, R.4
-
26
-
-
24644520778
-
-
J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, and E. Zeidner. Internet small computer systems interface (iscsi), 2004.
-
(2004)
Internet Small Computer Systems Interface (Iscsi)
-
-
Satran, J.1
Meth, K.2
Sapuntzakis, C.3
Chadalapaka, M.4
Zeidner, E.5
-
27
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, SOSP '07, pages 335-350, 2007.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
28
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing i/o device security
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. Bitvisor: a thin hypervisor for enforcing i/o device security. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE '09, pages 121-130, 2009.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '09
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
29
-
-
80755144012
-
Process out-grafting: An efficient "out-of-vm" approach for fine-grained process execution monitoring
-
New York, NY, USA, ACM
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu. Process out-grafting: an efficient "out-of-vm" approach for fine-grained process execution monitoring. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 363-374, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 363-374
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
31
-
-
84863587926
-
-
TrueCrypt. http://www.truecrypt.org/.
-
TrueCrypt
-
-
-
32
-
-
84863577986
-
-
VMware ACE. http://www.vmware.com/products/ace/.
-
VMware ACE
-
-
-
33
-
-
62349098595
-
Virtualbox: Bits and bytes masquerading as machines
-
February
-
J. Watson. Virtualbox: bits and bytes masquerading as machines. Linux J., 2008, February 2008.
-
(2008)
Linux J.
, vol.2008
-
-
Watson, J.1
-
34
-
-
84863577984
-
-
version 5.2 technical specifications
-
WinMagic. Securedoctm version 5.2 technical specifications, 2011.
-
(2011)
WinMagic. Securedoctm
-
-
|