-
1
-
-
84859724464
-
Towards proving security in the presence of large untrusted components
-
(Vancouver, Canada, Oct 2010), G. Klein, R. Huuck, and B. Schlich, Eds., USENIX. 1
-
ANDRONICK, J., GREENAWAY, D., AND ELPHINSTONE, K. Towards proving security in the presence of large untrusted components. In 5th SSV (Vancouver, Canada, Oct 2010), G. Klein, R. Huuck, and B. Schlich, Eds., USENIX. 1
-
5th SSV
-
-
ANDRONICK, J.1
GREENAWAY, D.2
ELPHINSTONE, K.3
-
2
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
3
-
ARBAUGH, W. A., FARBER, D. J., AND SMITH, J. M. A secure and reliable bootstrap architecture. In IEEE Symp. Security & Privacy (1997), pp. 65-71. 3
-
(1997)
IEEE Symp. Security & Privacy
, pp. 65-71
-
-
ARBAUGH, W. A.1
FARBER, D. J.2
SMITH, J. M.3
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
(Bolton Landing, NY, USA, Oct), 1
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the art of virtualization. In 19th SOSP (Bolton Landing, NY, USA, Oct 2003), pp. 164-177. 1
-
(2003)
19th SOSP
, pp. 164-177
-
-
BARHAM, P.1
DRAGOVIC, B.2
FRASER, K.3
HAND, S.4
HARRIS, T.5
HO, A.6
NEUGEBAUER, R.7
PRATT, I.8
WARFIELD, A.9
-
4
-
-
70349120464
-
-
THE GOOGLE CHROME TEAM. Technical report, Stanford Security Laboratory
-
BARTH, A., JACKSON, C., REIS, C., AND THE GOOGLE CHROME TEAM. The security architecture of the Chromium browser. Technical report, Stanford Security Laboratory, 2008. 2
-
(2008)
The security architecture of the Chromium browser
, pp. 2
-
-
BARTH, A.1
JACKSON, C.2
REIS, C.3
-
5
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
(Bolton Landing, NY, USA, Oct), 1
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. Terra: A virtual machine-based platform for trusted computing. In 19th SOSP (Bolton Landing, NY, USA, Oct 2003), pp. 193-206. 1
-
(2003)
19th SOSP
, pp. 193-206
-
-
GARFINKEL, T.1
PFAFF, B.2
CHOW, J.3
ROSENBLUM, M.4
BONEH, D.5
-
6
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
(Alexandria, VA, USA, Oct), 3
-
GOLDMAN, K., PEREZ, R., AND SAILER, R. Linking remote attestation to secure tunnel endpoints. In 1st WS Scalable Trusted Comput. (Alexandria, VA, USA, Oct 2006), pp. 21-24. 3
-
(2006)
1st WS Scalable Trusted Comput
, pp. 21-24
-
-
GOLDMAN, K.1
PEREZ, R.2
SAILER, R.3
-
7
-
-
84897815041
-
-
GREEEN HILLS SOFTWARE
-
GREEEN HILLS SOFTWARE. INTEGRITY secure virtualization. http://www.ghs.com/products/rtos/integrity virtualization. html. 2
-
INTEGRITY secure virtualization
-
-
-
8
-
-
50249182906
-
Secure web browsing with the OP web browser
-
(Oakland, CA, USA), 2
-
GRIER, C., TANG, S., AND KING, S. T. Secure web browsing with the OP web browser. In IEEE Symp. Security & Privacy (Oakland, CA, USA, 2008), pp. 402-416. 2
-
(2008)
IEEE Symp. Security & Privacy
, pp. 402-416
-
-
GRIER, C.1
TANG, S.2
KING, S. T.3
-
9
-
-
0020920186
-
Principles of transaction-oriented database recovery
-
4
-
HÄRDER, T., AND REUTER, A. Principles of transaction-oriented database recovery. Comput. Surveys 15 (1983), 287-317. 4
-
(1983)
Comput. Surveys
, vol.15
, pp. 287-317
-
-
HÄRDER, T.1
REUTER, A.2
-
10
-
-
84889987136
-
Trusted ⇐ trustworthy ⇐ proof-position paper
-
(Berlin, Germany, Jul 2009), D. Gawrock, H. Raimer, A.-R. Sadeghi, and C. Vishik, Eds., Vieweg+Teubner, 3
-
HEISER, G. Trusted ⇐ trustworthy ⇐ proof-position paper. In 1st Conf. Future Trust Comput. (Berlin, Germany, Jul 2009), D. Gawrock, H. Raimer, A.-R. Sadeghi, and C. Vishik, Eds., Vieweg+Teubner, pp. 55-59. 3
-
1st Conf. Future Trust Comput
, pp. 55-59
-
-
HEISER, G.1
-
11
-
-
78149343900
-
The OKL4 Microvisor: Convergence point of microkernels and hypervisors
-
(New Delhi, India, Aug), 2
-
HEISER, G., AND LESLIE, B. The OKL4 Microvisor: Convergence point of microkernels and hypervisors. In 1st APSys (New Delhi, India, Aug 2010), pp. 19-24. 2
-
(2010)
1st APSys
, pp. 19-24
-
-
HEISER, G.1
LESLIE, B.2
-
13
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
(Big Sky, MT, USA, Oct), ACM, 1, 2
-
KLEIN, G., ELPHINSTONE, K., HEISER, G., ANDRONICK, J., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., AND WINWOOD, S. seL4: Formal verification of an OS kernel. In 22nd SOSP (Big Sky, MT, USA, Oct 2009), ACM, pp. 207-220. 1, 2
-
(2009)
22nd SOSP
, pp. 207-220
-
-
KLEIN, G.1
ELPHINSTONE, K.2
HEISER, G.3
ANDRONICK, J.4
COCK, D.5
DERRIN, P.6
ELKADUWE, D.7
ENGELHARDT, K.8
KOLANSKI, R.9
NORRISH, M.10
SEWELL, T.11
TUCH, H.12
WINWOOD, S.13
-
14
-
-
85059852174
-
Provable security: How feasible is it?
-
(Napa, CA, USA, May)
-
KLEIN, G., MURRAY, T., GAMMIE, P., SEWELL, T., AND WINWOOD, S. Provable security: How feasible is it? In 13th HotOS (Napa, CA, USA, May 2011). 1, 2
-
(2011)
13th HotOS
, vol.1
, pp. 2
-
-
KLEIN, G.1
MURRAY, T.2
GAMMIE, P.3
SEWELL, T.4
WINWOOD, S.5
-
15
-
-
85092671012
-
-
L4KA TEAM. L4Ka::Pistachio kernel
-
L4KA TEAM. L4Ka::Pistachio kernel. http://l4ka.org/projects/pistachio/. 2
-
-
-
-
16
-
-
33745189623
-
Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
-
(Charleston, SC, USA), J. G. Morrisett and S. L. P. Jones, Eds., ACM, 1
-
LEROY, X. Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant. In 33rd POPL (Charleston, SC, USA, 2006), J. G. Morrisett and S. L. P. Jones, Eds., ACM, pp. 42-54. 1
-
(2006)
33rd POPL
, pp. 42-54
-
-
LEROY, X.1
-
18
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
(Apr)
-
MCCUNE, J. M., PARNO, B., PERRIG, A., REITER, M. K., AND ISOZAKI, H. Flicker: An execution infrastructure for TCB minimization. In 3rd EuroSys Conf. (Apr 2008). 3
-
(2008)
3rd EuroSys Conf
, pp. 3
-
-
MCCUNE, J. M.1
PARNO, B.2
PERRIG, A.3
REITER, M. K.4
ISOZAKI, H.5
-
20
-
-
78249252448
-
-
version 0.3. Jan 2010. 1, 2, 3
-
RUTKOWSKA, J., AND WOJTCZUK, R. Qubes OS architecture, version 0.3. http://qubes-os.org/Architecture.html, Jan 2010. 1, 2, 3
-
Qubes OS architecture
-
-
RUTKOWSKA, J.1
WOJTCZUK, R.2
-
21
-
-
72249114480
-
Automatic device driver synthesis with Termite
-
(Big Sky, MT, USA, Oct)
-
RYZHYK, L., CHUBB, P., KUZ, I., LE SUEUR, E., AND HEISER, G. Automatic device driver synthesis with Termite. In 22nd SOSP (Big Sky, MT, USA, Oct 2009). 4
-
(2009)
22nd SOSP
, pp. 4
-
-
RYZHYK, L.1
CHUBB, P.2
KUZ, I.3
LE SUEUR, E.4
HEISER, G.5
-
22
-
-
79960259528
-
NOVA: A microhypervisorbased secure virtualization architecture
-
(Paris, France, Apr)
-
STEINBERG, U., AND KAUER, B. NOVA: A microhypervisorbased secure virtualization architecture. In 5th EuroSys Conf. (Paris, France, Apr 2010). 2
-
(2010)
5th EuroSys Conf
, pp. 2
-
-
STEINBERG, U.1
KAUER, B.2
-
23
-
-
84857516359
-
Trust and protection in the Illinois Browser Operating System
-
(Vancouver, BC, Canada, Oct), 2
-
TANG, S., MAI, H., AND KING, S. T. Trust and protection in the Illinois Browser Operating System. In 9th OSDI (Vancouver, BC, Canada, Oct 2010), pp. 1-15. 2
-
(2010)
9th OSDI
, pp. 1-15
-
-
TANG, S.1
MAI, H.2
KING, S. T.3
-
24
-
-
84870630391
-
-
TRUSTED COMPUTING GROUP
-
TRUSTED COMPUTING GROUP. Trusted Platform Module. http://www.trustedcomputinggroup.org/developers/trusted platform module. 2
-
Trusted Platform Module
-
-
|