-
2
-
-
84872093792
-
-
ARM, "Cortex-A15 processor," http://www.arm.com/products/ processors/cortex-a/cortex-a15.php.
-
Cortex-A15 Processor
-
-
-
3
-
-
84862928448
-
Virtualization is coming to a platform near you
-
R. Mijat and A. Nightingale, "Virtualization is coming to a platform near you," ARM Whitepaper, 2011, http://www.arm.com/files/pdf/System-MMU- Whitepaper-v8.0.pdf.
-
(2011)
ARM Whitepaper
-
-
Mijat, R.1
Nightingale, A.2
-
4
-
-
38149114073
-
-
Advanced Micro Devices, Inc.
-
Advanced Micro Devices, Inc., "AMD I/O Virtualization Technology (IOMMU) Specification," 2009, http://www.mimuw.edu.pl/~vincent/lecture6/ sources/amd-pacifica-specification.pdf.
-
(2009)
AMD I/O Virtualization Technology (IOMMU) Specification
-
-
-
5
-
-
63149097189
-
Virtualization as an enabler for security in mobile devices
-
ser. IIES '08. ACM
-
J. Brakensiek, A. Dröge, M. Botteck, H. Härtig, and A. Lackorzynski, "Virtualization as an enabler for security in mobile devices," in Proceedings of the 1st workshop on Isolation and integration in embedded systems, ser. IIES '08. ACM, 2008, pp. 17-22.
-
(2008)
Proceedings of the 1st Workshop on Isolation and Integration in Embedded Systems
, pp. 17-22
-
-
Brakensiek, J.1
Dröge, A.2
Botteck, M.3
Härtig, H.4
Lackorzynski, A.5
-
6
-
-
21644433634
-
Xen and the Art of Virtualization
-
ser. Operating Systems Review, New York: ACM Press, Oct. 19-22
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization," in Proceedings of the nineteenth ACM symposium on Operating systems principles, ser. Operating Systems Review, vol. 37, 5. New York: ACM Press, Oct. 19-22 2003, pp. 164-177.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
51949098506
-
Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones
-
J.-Y. Hwang, S.-B. Suh, S.-K. Heo, C.-J. Park, J.-M. Ryu, S.-Y. Park, and C.-R. Kim, "Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones," in 5th IEEE Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV, USA, Jan. 2008.
-
5th IEEE Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV, USA, Jan. 2008
-
-
Hwang, J.-Y.1
Suh, S.-B.2
Heo, S.-K.3
Park, C.-J.4
Ryu, J.-M.5
Park, S.-Y.6
Kim, C.-R.7
-
8
-
-
63749113226
-
A Practical Look at Micro-Kernels and Virtual Machine Monitors
-
F. Armand and M. Gien, "A Practical Look at Micro-Kernels and Virtual Machine Monitors," in Proceedings of the 6th Consumer Communications and Networking Conference (IEEE CCNC '09), Las Vegas, NV, USA, Jan. 2009.
-
Proceedings of the 6th Consumer Communications and Networking Conference (IEEE CCNC '09), Las Vegas, NV, USA, Jan. 2009
-
-
Armand, F.1
Gien, M.2
-
9
-
-
41149103393
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, "SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes," in Proceedings of the 21st Symposium on Operating System Principles(SOSP 2007), Stevenson, Washington, USA, Oct. 14-17 2007, pp. 335-350.
-
Proceedings of the 21st Symposium on Operating System Principles(SOSP 2007), Stevenson, Washington, USA, Oct. 14-17 2007
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
10
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig, "TrustVisor: Efficient TCB reduction and attestation," in Proceedings of the IEEE Symposium on Security and Privacy, May 2010.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 2010
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
11
-
-
3142677409
-
-
Dresden University of Technology, Dresden, Germany, Tech. Rep. TUD-FI03-08
-
H. Härtig, J. Löser, F. Mehnert, L. Reuther, M. Pohlack, and A. Warg, "An I/O Architecture for Mikrokernel-Based Operating Systems," Dresden University of Technology, Dresden, Germany, Tech. Rep. TUD-FI03-08, 2003, http://os.inf.tu-dresden.de/papers-ps/tr-ioarch-2003.pdf.
-
(2003)
An I/O Architecture for Mikrokernel-Based Operating Systems
-
-
Härtig, H.1
Löser, J.2
Mehnert, F.3
Reuther, L.4
Pohlack, M.5
Warg, A.6
-
12
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Big Sky, MT, USA: ACM, October
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal verification of an OS kernel," in Proc. 22nd ACM Symposium on Operating Systems Principles (SOSP). Big Sky, MT, USA: ACM, October 2009, pp. 207-220.
-
(2009)
Proc. 22nd ACM Symposium on Operating Systems Principles (SOSP)
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
15
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
W. Arbaugh, D. Farber, and J. Smith, "A secure and reliable bootstrap architecture," IEEE Symposium on Security and Privacy, p. 0065, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 0065
-
-
Arbaugh, W.1
Farber, D.2
Smith, J.3
-
16
-
-
78651394900
-
Exploiting an I/OMMU vulnerability
-
F. L. Sang, ric Lacombe, V. Nicomette, and Y. Deswarte, "Exploiting an I/OMMU vulnerability," in 5th International Conference on Malicious and Unwanted Software (MALWARE), 2010, pp. 7-14.
-
5th International Conference on Malicious and Unwanted Software (MALWARE), 2010
, pp. 7-14
-
-
Sang, F.L.1
Lacombe, R.2
Nicomette, V.3
Deswarte, Y.4
|