-
2
-
-
84866925595
-
Secure compilation to modern processors
-
Agten, P., Strackx, R., Jacobs, B., and Piessens, F. Secure compilation to modern processors. In Computer Security Foundations Symposium (2012), pp. 171-185.
-
(2012)
Computer Security Foundations Symposium
, pp. 171-185
-
-
Agten, P.1
Strackx, R.2
Jacobs, B.3
Piessens, F.4
-
3
-
-
0003930704
-
-
Cambridge University Press, New York, NY, USA
-
Appel, A. W. Compiling with Continuations. Cambridge University Press, New York, NY, USA, 2007.
-
(2007)
Compiling with Continuations
-
-
Appel, A.W.1
-
4
-
-
80755169488
-
Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
-
ACM
-
Azab, A., Ning, P., and Zhang, X. Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In Proceedings of the 18th ACM conference on Computer and communications security (2011), ACM, pp. 375-388.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Azab, A.1
Ning, P.2
Zhang, X.3
-
5
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Lewis, E. C., Subrahmanyam, P., Waldspurger, C. A., Boneh, D., Dwoskin, J., and Ports, D. R. K. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In ASPLOS (2008).
-
(2008)
ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
6
-
-
70349325391
-
Vcc: A practical system for verifying concurrent c
-
(Berlin, Heidelberg), TPHOLs '09, Springer-Verlag
-
Cohen, E., Dahlweid, M., Hillebrand, M., Leinenbach, D., Moskal, M., Santen, T., Schulte, W., and Tobies, S. Vcc: A practical system for verifying concurrent c. In Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics (Berlin, Heidelberg, 2009), TPHOLs '09, Springer-Verlag, pp. 23-42.
-
(2009)
Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics
, pp. 23-42
-
-
Cohen, E.1
Dahlweid, M.2
Hillebrand, M.3
Leinenbach, D.4
Moskal, M.5
Santen, T.6
Schulte, W.7
Tobies, S.8
-
7
-
-
70449640065
-
A logic of secure systems and its application to trusted computing
-
IEEE
-
Datta, A., Franklin, J., Garg, D., and Kaynar, D. A logic of secure systems and its application to trusted computing. In 30th IEEE Symposium on Security and Privacy (2009), IEEE, pp. 221-236.
-
(2009)
30th IEEE Symposium on Security and Privacy
, pp. 221-236
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Kaynar, D.4
-
8
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., and Yao, A. C. On the security of public key protocols. IEEE Transactions on Information Theory 29, 2 (1983), 198-208.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
9
-
-
84866913681
-
Smart: Secure and minimal architecture for (establishing a dynamic) root of trust
-
El Defrawy, K., Aurélien Francillon, D., and Tsudik, G. Smart: Secure and minimal architecture for (establishing a dynamic) root of trust. In Proceedings of the Network & Distributed System Security Symposium (NDSS), San Diego, CA (2012).
-
(2012)
Proceedings of the Network & Distributed System Security Symposium (NDSS), San Diego, CA
-
-
El Defrawy, K.1
Aurélien Francillon, D.2
Tsudik, G.3
-
10
-
-
0042349623
-
A trusted open platform
-
July
-
England, P., Lampson, B., Manferdelli, J., and Willman, B. A trusted open platform. Computer 36, 7 (July 2003), 55-62.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Willman, B.4
-
13
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Operating Systems Review 37, 5 (2003), 193-206.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
14
-
-
85077706009
-
Improving the security of trusted computing
-
(Berkeley, CA, USA), USENIX Association
-
Kauer, B. Oslo: improving the security of trusted computing. In SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 1-9.
-
(2007)
SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-9
-
-
Kauer, B.O.1
-
15
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
King, S., Chen, P., Wang, Y., Verbowski, C., Wang, H., and Lorch, J. SubVirt: Implementing malware with virtual machines. IEEE Symposium on Security and Privacy (Oakland) (2006).
-
(2006)
IEEE Symposium on Security and Privacy (Oakland)
-
-
King, S.1
Chen, P.2
Wang, Y.3
Verbowski, C.4
Wang, H.5
Lorch, J.6
-
16
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
ACM
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., et al. seL4: Formal verification of an OS kernel. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (2009), ACM, pp. 207-220.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
-
17
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
Longley, D., and Rigby, S. An automatic search for security flaws in key management schemes. Computers & Security 11, 1 (1992), 75-89.
-
(1992)
Computers & Security
, vol.11
, Issue.1
, pp. 75-89
-
-
Longley, D.1
Rigby, S.2
-
18
-
-
77955034948
-
Conqueror: Tamper-proof code execution on legacy systems
-
(July), Lecture Notes in Computer Science, Springer. Bonn, Germany
-
Martignoni, L., Paleari, R., and Bruschi, D. Conqueror: tamper-proof code execution on legacy systems. In Proceedings of the 7th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) (July 2010), Lecture Notes in Computer Science, Springer, pp. 21-40. Bonn, Germany.
-
(2010)
Proceedings of the 7th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
, pp. 21-40
-
-
Martignoni, L.1
Paleari, R.2
Bruschi, D.3
-
19
-
-
84870632612
-
-
Martignoni, L., Poosankam, P., Zaharia, M., Han, J., McCamant, S., Song, D., Paxson, V., Perrig, A., Shenker, S., and Stoica, I. Cloud terminal: Secure access to sensitive applications from untrusted systems.
-
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems
-
-
Martignoni, L.1
Poosankam, P.2
Zaharia, M.3
Han, J.4
McCamant, S.5
Song, D.6
Paxson, V.7
Perrig, A.8
Shenker, S.9
Stoica, I.10
-
20
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
May
-
McCune, J. M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., and Perrig, A. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (May 2010).
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
21
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
(Apr.), ACM
-
McCune, J. M., Parno, B., Perrig, A., Reiter, M. K., and Isozaki, H. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the ACM European Conference in Computer Systems (EuroSys) (Apr. 2008), ACM, pp. 315-328.
-
(2008)
Proceedings of the ACM European Conference in Computer Systems (EuroSys)
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
23
-
-
0006100649
-
Smashing the stack for fun and profit
-
One, A. Smashing the stack for fun and profit. Phrack magazine 7, 49 (1996).
-
(1996)
Phrack Magazine
, vol.7
, pp. 49
-
-
One, A.1
-
24
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
May
-
Parno, B., Lorch, J. R., Douceur, J. R., Mickens, J., and McCune, J. M. Memoir: Practical state continuity for protected modules. In Proceedings of the IEEE Symposium on Security and Privacy (May 2011).
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
26
-
-
85035001592
-
Definitional interpreters for higher-order programming languages
-
Reynolds, J. Definitional interpreters for higher-order programming languages. In proceedings 25th ACM National Conference (1972), pp. 717-740.
-
(1972)
Proceedings 25th ACM National Conference
, pp. 717-740
-
-
Reynolds, J.1
-
27
-
-
55549097262
-
Subverting VistaTM kernel for fun and profit
-
Rutkowska, J. Subverting VistaTM Kernel For Fun And Profit. Black Hat Briefings (2006).
-
(2006)
Black Hat Briefings
-
-
Rutkowska, J.1
-
28
-
-
84866901447
-
Protecting critical applications on mobile platforms
-
Sahita R, Warrier U., D. P. Protecting Critical Applications on Mobile Platforms. Intel Technology Journal 13 (2009), 16-35.
-
(2009)
Intel Technology Journal
, vol.13
, pp. 16-35
-
-
Sahita, R.1
Warrier, U.D.P.2
-
29
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J., and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (1975), 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
30
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
ACM
-
Seshadri, A., Luk, M., Qu, N., and Perrig, A. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles (2007), ACM, pp. 335-350.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
31
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
(Oct.), ACM
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., and Khosla, P. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP) (Oct. 2005), ACM, pp. 1-15.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
32
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
(New York, NY, USA), CCS '07, ACM
-
Shacham, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), CCS '07, ACM, pp. 552-561.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
33
-
-
34748842601
-
Reducing tcb complexity for security-sensitive applications: Three case studies
-
(New York, NY, USA), ACM
-
Singaravelu, L., Pu, C., Härtig, H., and Helmuth, C. Reducing tcb complexity for security-sensitive applications: three case studies. In EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006 (New York, NY, USA, 2006), ACM, pp. 161-174.
-
(2006)
EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
34
-
-
84863437524
-
Efficient isolation of trusted subsystems in embedded systems
-
Strackx, R., Piessens, F., and Preneel, B. Efficient Isolation of Trusted Subsystems in Embedded Systems. Security and Privacy in Communication Networks (2010), 344-361.
-
(2010)
Security and Privacy in Communication Networks
, pp. 344-361
-
-
Strackx, R.1
Piessens, F.2
Preneel, B.3
-
35
-
-
70349100695
-
Breaking the memory secrecy assumption
-
ACM
-
Strackx, R., Younan, Y., Philippaerts, P., Piessens, F., Lachmund, S., and Walter, T. Breaking the memory secrecy assumption. In Proceedings of the Second European Workshop on System Security (2009), ACM, pp. 1-8.
-
(2009)
Proceedings of the Second European Workshop on System Security
, pp. 1-8
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
36
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
USENIX Association
-
Ta-Min, R., Litty, L., and Lie, D. Splitting interfaces: Making trust between applications and operating systems configurable. In Proceedings of the 7th symposium on Operating systems design and implementation (2006), USENIX Association, pp. 279-292.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 279-292
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
37
-
-
0039927533
-
Architectural support for copy and tamper resistant software
-
November
-
Thekkath, D. L. C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., and Horowitz, M. Architectural support for copy and tamper resistant software. SIGOPS Oper. Syst. Rev. 34 (November 2000), 168-177.
-
(2000)
SIGOPS Oper. Syst. Rev.
, vol.34
, pp. 168-177
-
-
Thekkath, D.L.C.1
Mitchell, M.2
Lincoln, P.3
Boneh, D.4
Mitchell, J.5
Horowitz, M.6
-
39
-
-
38849147719
-
Code injection in c and c++ : A survey of vulnerabilities and countermeasures
-
KULeuven
-
Younan, Y., Joosen, W., and Piessens, F. Code injection in c and c++ : A survey of vulnerabilities and countermeasures. Tech. rep., Department of Computer Science, KULeuven, 2004.
-
(2004)
Tech. Rep., Department of Computer Science
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
40
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
Zhou, Z., Gligor, V., Newsome, J., and McCune, J. Building verifiable trusted path on commodity x86 computers. In IEEE Symposium on Security and Privacy (2012).
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Zhou, Z.1
Gligor, V.2
Newsome, J.3
McCune, J.4
|