-
1
-
-
84863645697
-
Managed Code Rootkits: Hooking into Runtime Environments
-
E. Metula, "Managed Code Rootkits: Hooking into Runtime Environments,"in BlackHat USA, 2009.
-
(2009)
BlackHat USA
-
-
Metula, E.1
-
2
-
-
84863645696
-
NET Framework Rootkits: Backdoors Inside Your Framework
-
E. Metula, ".NET Framework Rootkits: Backdoors Inside Your Framework,"in BlackHat Europe, 2009.
-
(2009)
BlackHat Europe
-
-
Metula, E.1
-
3
-
-
84863677711
-
JavaSnoop: How to hack anything in Java
-
A. Dabirsiaghi, "JavaSnoop: How to hack anything in Java," in BlackHat Las Vegas, 2010.
-
(2010)
BlackHat Las Vegas
-
-
Dabirsiaghi, A.1
-
4
-
-
84858758065
-
Vx32: Lightweight user-level sandboxing on the x86
-
B. Ford and R. Cox, "Vx32: lightweight user-level sandboxing on the x86," in USENIX ATC, 2008.
-
(2008)
USENIX ATC
-
-
Ford, B.1
Cox, R.2
-
5
-
-
33646805500
-
Cache missing for fun and profit
-
C. Percival, "Cache missing for fun and profit," in BSDCan, 2005.
-
(2005)
BSDCan
-
-
Percival, C.1
-
6
-
-
85084161596
-
Analysis of the intel pentium's ability to support a secure virtual machine monitor
-
J. S. Robin and C. E. Irvine, "Analysis of the intel pentium's ability to support a secure virtual machine monitor," in USENIX Security Symposium, 2000.
-
USENIX Security Symposium, 2000
-
-
Robin, J.S.1
Irvine, C.E.2
-
7
-
-
70849091604
-
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
-
T. Ormandy, "An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments," in CanSecWest, 2007.
-
(2007)
CanSecWest
-
-
Ormandy, T.1
-
11
-
-
53349091372
-
Compatibility is not transparency: Vmm detection myths and realities
-
T. Garfinkel, et al., "Compatibility is not transparency: Vmm detection myths and realities," in HotOS, 2007.
-
(2007)
HotOS
-
-
Garfinkel, T.1
-
12
-
-
74049116761
-
Remote detection of virtual machine monitors with fuzzy benchmarking
-
April
-
J. Franklin, et al., "Remote detection of virtual machine monitors with fuzzy benchmarking," SIGOPS Oper. Syst. Rev., April 2008.
-
(2008)
SIGOPS Oper. Syst. Rev.
-
-
Franklin, J.1
-
13
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, et al., "Terra: a virtual machine-based platform for trusted computing," in SOSP, 2003.
-
(2003)
SOSP
-
-
Garfinkel, T.1
-
14
-
-
84863687305
-
-
June
-
Trusted Computing Group, http://www.trustedcomputinggroup.org/, June 2011.
-
(2011)
-
-
-
16
-
-
77950820630
-
Hima: A hypervisor-based integrity measurement agent
-
dec.
-
A. Azab, et al., "Hima: A hypervisor-based integrity measurement agent," in ACSAC, dec. 2009.
-
(2009)
ACSAC
-
-
Azab, A.1
-
17
-
-
84863691168
-
-
Aug.
-
Moonsols, "LiveCloudKd," http://www.moonsols.com/2010/08/12/ livecloudkd/, Aug. 2011.
-
(2011)
LiveCloudKd
-
-
-
18
-
-
54049127315
-
Forensics examination of volatile system data using virtual introspection
-
April
-
B. Hay and K. Nance, "Forensics examination of volatile system data using virtual introspection," SIGOPS Oper. Syst. Rev., April 2008.
-
(2008)
SIGOPS Oper. Syst. Rev.
-
-
Hay, B.1
Nance, K.2
-
19
-
-
33750248123
-
Building a mac-based security architecture for the xen open-source hypervisor
-
R. Sailer, et al., "Building a mac-based security architecture for the xen open-source hypervisor," in ACSAC, 2005.
-
(2005)
ACSAC
-
-
Sailer, R.1
-
20
-
-
84863704754
-
-
May
-
National Security Agency, "Security enhanced linux," http://www.nsa.gov/ research/ selinux/, May 2011.
-
(2011)
Security Enhanced Linux
-
-
-
22
-
-
78650092747
-
Analyzing and comparing the protection quality of security enhanced operating systems
-
H. Chen, N. Li, and Z. Mao, "Analyzing and comparing the protection quality of security enhanced operating systems," in NDSS, 2009.
-
(2009)
NDSS
-
-
Chen, H.1
Li, N.2
Mao, Z.3
-
23
-
-
85067179564
-
Capsicum: Practical capabilities for unix
-
R. Watson, et al., "Capsicum: practical capabilities for unix," in USENIX Security, 2010.
-
(2010)
USENIX Security
-
-
Watson, R.1
-
24
-
-
77949482509
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
R. Riley, X. Jiang, and D. Xu, "Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing," in RAID, 2008.
-
(2008)
RAID
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
25
-
-
79952398762
-
Trusted data sharing over untrusted cloud storage providers
-
Nov.
-
G. Zhao, et al., "Trusted data sharing over untrusted cloud storage providers," in CloudCom, Nov. 2010.
-
(2010)
CloudCom
-
-
Zhao, G.1
-
27
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in STOC, 2009.
-
(2009)
STOC
-
-
Gentry, C.1
-
28
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
March
-
C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, March 2010.
-
(2010)
Commun. ACM
-
-
Gentry, C.1
-
30
-
-
48749099314
-
A cooperative internet backup scheme
-
M. Lillibridge, et al., "A cooperative internet backup scheme," in USENIX ATC, 2003.
-
(2003)
USENIX ATC
-
-
Lillibridge, M.1
-
31
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. Bowers, A. Juels, and A. Oprea, "Hail: A high-availability and integrity layer for cloud storage," in CCS, 2009.
-
(2009)
CCS
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
32
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
July
-
C. Wang, et al., "Ensuring data storage security in cloud computing,"in IWQoS, July 2009.
-
(2009)
IWQoS
-
-
Wang, C.1
-
33
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Nov.
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage," Security Privacy, IEEE, Nov. 2010.
-
(2010)
Security Privacy, IEEE
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
35
-
-
79956336361
-
Enforcing User Privacy in Web Applications using Erlang
-
I. Papagiannis et al., "Enforcing User Privacy in Web Applications using Erlang," in W2SP, 2009.
-
(2009)
W2SP
-
-
Papagiannis, I.1
-
36
-
-
0012970453
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in CRYPTO, 2001.
-
(2001)
CRYPTO
-
-
Boneh, D.1
Franklin, M.K.2
-
37
-
-
78751480363
-
Identity-based authentication in cloud storage sharing
-
Nov.
-
L. Kang and X. Zhang, "Identity-based authentication in cloud storage sharing," in MINES, Nov. 2010.
-
(2010)
MINES
-
-
Kang, L.1
Zhang, X.2
-
38
-
-
78249245445
-
Efficient sharing of secure cloud storage services
-
June
-
Q. Liu, G. Wang, and J. Wu, "Efficient sharing of secure cloud storage services," in CIT, June 2010.
-
(2010)
CIT
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
40
-
-
79952408990
-
Fine-grained Data Access Control Systems with User Accountability in Cloud Computing
-
J. Li et al., "Fine-grained Data Access Control Systems with User Accountability in Cloud Computing," in CloudCom, 2010.
-
(2010)
CloudCom
-
-
Li, J.1
-
41
-
-
33645998872
-
Fuzzy identity-based encryption
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, 2005.
-
(2005)
EUROCRYPT
-
-
Sahai, A.1
Waters, B.2
-
42
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, et al., "Attribute-based encryption for fine-grained access control of encrypted data," in CCS, 2006.
-
(2006)
CCS
-
-
Goyal, V.1
-
44
-
-
57949108294
-
Multi-authority attribute based encryption
-
M. Chase, "Multi-authority attribute based encryption," Theory of Cryptography, 2007.
-
(2007)
Theory of Cryptography
-
-
Chase, M.1
-
45
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in CCS, 2009.
-
(2009)
CCS
-
-
Chase, M.1
Chow, S.S.2
-
46
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Mar.
-
S. Yu, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM, Mar. 2010.
-
(2010)
IEEE INFOCOM
-
-
Yu, S.1
-
47
-
-
80051911576
-
Cryptographic cloud storage
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in FC, 2010.
-
(2010)
FC
-
-
Kamara, S.1
Lauter, K.2
-
48
-
-
78650059341
-
Toward a Multi-Tenancy Authorization System for Cloud Services
-
Nov.
-
J. Calero, et al., "Toward a Multi-Tenancy Authorization System for Cloud Services," Security Privacy, IEEE, Nov. 2010.
-
(2010)
Security Privacy, IEEE
-
-
Calero, J.1
-
49
-
-
79958720688
-
Towards a data-centric view of cloud security
-
W. Zhou, et al., "Towards a data-centric view of cloud security," in CloudDB, 2010.
-
(2010)
CloudDB
-
-
Zhou, W.1
-
50
-
-
77955136320
-
Preserving Privacy Based on Semantic Policy Tools
-
L. Kagal and J. Pato, "Preserving Privacy Based on Semantic Policy Tools," IEEE Security & Privacy, 2010.
-
(2010)
IEEE Security & Privacy
-
-
Kagal, L.1
Pato, J.2
-
51
-
-
77955917018
-
SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers
-
F. De Keukelaere, et al., "SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers," in WWW, 2008.
-
(2008)
WWW
-
-
De Keukelaere, F.1
-
52
-
-
70349300102
-
OMash: Enabling Secure Web Mashups via Object Abstractions
-
S. Crites, F. Hsu, and H. Chen, "OMash: Enabling Secure Web Mashups via Object Abstractions," in CCS, 2008.
-
(2008)
CCS
-
-
Crites, S.1
Hsu, F.2
Chen, H.3
-
53
-
-
77954584716
-
Reining in the Web with Content Security Policy
-
S. Stamm, B. Sterne, and G. Markham, "Reining in the Web with Content Security Policy," in WWW, 2010.
-
(2010)
WWW
-
-
Stamm, S.1
Sterne, B.2
Markham, G.3
-
54
-
-
70349266257
-
Robust Defenses for Cross-Site Request Forgery
-
A. Barth, C. Jackson, and J. C. Mitchell, "Robust Defenses for Cross-Site Request Forgery," in CCS, 2008.
-
(2008)
CCS
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
56
-
-
80051946867
-
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
-
P. Saxena, et al., "FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications," in NDSS, 2010.
-
(2010)
NDSS
-
-
Saxena, P.1
-
58
-
-
85030494194
-
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications
-
Z. Li et al., "WebShield: Enabling Various Web Defense Techniques without Client Side Modifications," in NDSS, 2011.
-
(2011)
NDSS
-
-
Li, Z.1
-
59
-
-
85076780225
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
C. Reis, et al., "Browsershield: vulnerability-driven filtering of dynamic html," in OSDI, 2006.
-
(2006)
OSDI
-
-
Reis, C.1
-
60
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
A. Moshchuk, et al., "Spyproxy: execution-based detection of malicious web content," in USENIX Security Symposium, 2007.
-
USENIX Security Symposium, 2007
-
-
Moshchuk, A.1
-
63
-
-
77958047034
-
Ontological approach toward cybersecurity in cloud computing
-
T. Takahashi, Y. Kadobayashi, and H. Fujiwara, "Ontological approach toward cybersecurity in cloud computing," in SIN, 2010.
-
(2010)
SIN
-
-
Takahashi, T.1
Kadobayashi, Y.2
Fujiwara, H.3
-
64
-
-
84863691172
-
CYBEX - The Cybersecurity Information Exchange Framework (X.1500)
-
Oct.
-
A. Rutkowski, et al., "CYBEX - The Cybersecurity Information Exchange Framework (X.1500)," CCR, Oct. 2010.
-
(2010)
CCR
-
-
Rutkowski, A.1
-
65
-
-
84863687306
-
IODEF-extension to support structured cybersecurity information
-
(draft-ietf-mile-sci-03.txt), Feb.
-
T. Takahashi, et al., "IODEF-extension to support structured cybersecurity information," IETF Internet Draft (draft-ietf-mile-sci-03. txt), Feb. 2012.
-
(2012)
IETF Internet Draft
-
-
Takahashi, T.1
-
67
-
-
85011904060
-
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2
-
Sept.
-
D. Waltermire, et al., "The Technical Specification for the Security Content Automation Protocol (SCAP) : SCAP Version 1.2," NIST Special Publication 800-126 Revision 2, Sept. 2011.
-
(2011)
NIST Special Publication 800-126 Revision 2
-
-
Waltermire, D.1
|