-
1
-
-
51849104627
-
TrustZone: Integrated Hardware and Software Security
-
T. Alves and D. Felton. TrustZone : Integrated Hardware and Software Security. ARM white paper, 2004.
-
(2004)
ARM White Paper
-
-
Alves, T.1
Felton, D.2
-
2
-
-
85175129478
-
AMD I/O virtualization technology (IOMMU) specification
-
AMD. rev. 1.26
-
AMD. AMD I/O virtualization technology (IOMMU) specification. AMD Pub. no. 34434 rev. 1.26, 2009.
-
(2009)
AMD Pub. No. 34434
-
-
-
3
-
-
84867518815
-
System Programming
-
AMD. Pub. no. 24593 rev. 3.20
-
AMD. AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.20, 2011.
-
(2011)
AMD 64 Architecture Programmer's Manual
, vol.2
-
-
-
5
-
-
0016873760
-
Penetrating an operating system: A study of VM/370 integrity
-
C. R. Attanasio, P. W. Markstein, and R. J. Phillips. Penetrating an operating system: a study of VM/370 integrity. IBM System Journal, 15(1):102-116, 1976.
-
(1976)
IBM System Journal
, vol.15
, Issue.1
, pp. 102-116
-
-
Attanasio, C.R.1
Markstein, P.W.2
Phillips, R.J.3
-
7
-
-
84878356074
-
-
BAE Systems Information Technology LLC. Version 1.11 for XTS-400, Version 6
-
BAE Systems Information Technology LLC. Security Target, Version 1.11 for XTS-400, Version 6, 2004.
-
(2004)
Security Target
-
-
-
8
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. ACM Symposium on Operating Systems Principles, 2003.
-
Proc. ACM Symposium on Operating Systems Principles, 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
13
-
-
81255158767
-
The end-to-end argument and application design: The role of trust
-
D. D. Clark and M. S. Blumenthal. The end-to-end argument and application design: the role of trust. Federal Communications Law Journal, 63(2):357-390, 2011.
-
(2011)
Federal Communications Law Journal
, vol.63
, Issue.2
, pp. 357-390
-
-
Clark, D.D.1
Blumenthal, M.S.2
-
14
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
P. Colp, M. Nanavati, J. Zhu, W. Aiello, G. Coker, T. Deegan, P. Loscocco, and A. Warfield. Breaking up is hard to do: Security and functionality in a commodity hypervisor. In Proc. ACM Symposium on Operating Systems Principles, 2011.
-
Proc. ACM Symposium on Operating Systems Principles, 2011
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
15
-
-
0003765587
-
-
Common Criteria for Information Technology Security Evaluation (CC). Version 3.1 CCMB-2009-07-004
-
Common Criteria for Information Technology Security Evaluation (CC). Common methodology for information technology security evaluation. Version 3.1 CCMB-2009-07-004, 2009.
-
(2009)
Common Methodology for Information Technology Security Evaluation
-
-
-
19
-
-
84974757646
-
A high assurance window system prototype
-
J. Epstein, C. Inc, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Danner, C. R. Martin, M. Branstad, G. Benson, and D. Rothnie. A high assurance window system prototype. Journal of Computer Security, 2(2):159-190, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2
, pp. 159-190
-
-
Epstein, J.1
Inc, C.2
McHugh, J.3
Orman, H.4
Pascale, R.5
Marmor-Squires, A.6
Danner, B.7
Martin, C.R.8
Branstad, M.9
Benson, G.10
Rothnie, D.11
-
23
-
-
85175129641
-
Accessing PCI Express configuration registers using Intel chipsets
-
S. Fleming. Accessing PCI Express configuration registers using Intel chipsets. Intel White Paper no. 321090, 2008.
-
(2008)
Intel White Paper No. 321090
-
-
Fleming, S.1
-
24
-
-
84878352778
-
Parametric verification of address space separation
-
J. Franklin, S. Chaki, A. Datta, J. M. McCune, and A. Vasudevan. Parametric verification of address space separation. In Proc. Conference on Principles of Security and Trust, 2012.
-
Proc. Conference on Principles of Security and Trust, 2012
-
-
Franklin, J.1
Chaki, S.2
Datta, A.3
McCune, J.M.4
Vasudevan, A.5
-
26
-
-
77957808684
-
The design and implementation of microdrivers
-
V. Ganapathy, M. J. Renzelmann, A. Balakrishnan, M. M. Swift, and S. Jha. The design and implementation of microdrivers. In Proc. International Conference on Architectural Support for Programming Languages and Operating Systems, 2008.
-
Proc. International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
28
-
-
0023293654
-
Design and implementation of secure Xenix
-
V. D. Gligor, C. S. Chandersekaran, R. S. Chapman, L. J. Dotterer, M. S. Hecht, W.-D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan. Design and implementation of secure Xenix. IEEE Transactions on Software Engineering, 13(2):208-221, 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 208-221
-
-
Gligor, V.D.1
Chandersekaran, C.S.2
Chapman, R.S.3
Dotterer, L.J.4
Hecht, M.S.5
Jiang, W.-D.6
Johri, A.7
Luckenbaugh, G.L.8
Vasudevan, N.9
-
30
-
-
84863111931
-
UNIX without the superuser
-
M. S. Hecht, M. E. Carson, C. S. Chandersekaran, R. S. Chapman, L. J. Dotterrer, V. D. Gligor, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan. UNIX without the superuser. In Proc. USENIX Annual Technical Conference, 1987.
-
Proc. USENIX Annual Technical Conference, 1987
-
-
Hecht, M.S.1
Carson, M.E.2
Chandersekaran, C.S.3
Chapman, R.S.4
Dotterrer, L.J.5
Gligor, V.D.6
Jiang, W.D.7
Johri, A.8
Luckenbaugh, G.L.9
Vasudevan, N.10
-
31
-
-
72049101360
-
-
HyperTransport Consortium. Doc. no. HTC20051222-0046-0008 rev.3.10
-
HyperTransport Consortium. HyperTransport I/O link specification. Doc. no. HTC20051222-0046-0008 rev.3.10, 2006.
-
(2006)
HyperTransport I/O Link Specification
-
-
-
34
-
-
85175131048
-
Intel virtualization technology for directed I/O architecture specification
-
Intel. rev. 1.3
-
Intel. Intel virtualization technology for directed I/O architecture specification. Intel Pub. no. D51397-005 rev. 1.3, 2011.
-
(2011)
Intel Pub. No. D51397-005
-
-
-
36
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In Proc. ACM Symposium on Operating Systems Principles, 2009.
-
Proc. ACM Symposium on Operating Systems Principles, 2009
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
37
-
-
70350757761
-
Usable security: How to get it
-
B. Lampson. Usable security: How to get it. Communications of the ACM, 52(11):25-27, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
, pp. 25-27
-
-
Lampson, B.1
-
40
-
-
33644593158
-
User-level device drivers: Achieved performance
-
B. Leslie, P. Chubb, N. Fitzroy-dale, S. Gotz, C. Gray, L. Macpherson, D. Potts, Y. Shen, K. Elphinstone, and G. Heiser. User-level device drivers: Achieved performance. Journal of Computer Science and Technology, 20(5):654-664, 2005.
-
(2005)
Journal of Computer Science and Technology
, vol.20
, Issue.5
, pp. 654-664
-
-
Leslie, B.1
Chubb, P.2
Fitzroy-dale, N.3
Gotz, S.4
Gray, C.5
Macpherson, L.6
Potts, D.7
Shen, Y.8
Elphinstone, K.9
Heiser, G.10
-
43
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In Proc. IEEE Symposium on Security and Privacy, 2010.
-
Proc. IEEE Symposium on Security and Privacy, 2010
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
44
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In Proc. European Conference in Computer Systems, 2008.
-
Proc. European Conference in Computer Systems, 2008
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
47
-
-
34548088028
-
Xen 3.0 and the art of virtualization
-
I. Pratt, K. Fraser, S. Hand, C. Limpach, A. Warfield, D. Magenheimer, J. Nakajima, and A. Mallick. Xen 3.0 and the art of virtualization. In Proc. Ottawa Linux Symposium, 2005.
-
Proc. Ottawa Linux Symposium, 2005
-
-
Pratt, I.1
Fraser, K.2
Hand, S.3
Limpach, C.4
Warfield, A.5
Magenheimer, D.6
Nakajima, J.7
Mallick, A.8
-
56
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing I/O device security
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. Bitvisor: a thin hypervisor for enforcing I/O device security. In Proc. ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2009.
-
Proc. ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2009
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
59
-
-
80755188561
-
Project Maux Mk.II - "I own the NIC, now I want a shell!"
-
A. Triulzi. Project Maux Mk.II - "I own the NIC, now I want a shell!". In PacSec/core, 2008.
-
(2008)
PacSec/core
-
-
Triulzi, A.1
-
60
-
-
84878369976
-
The Jedi Packet Trick takes over the Deathstar (or: "taking NIC backdoors to the next level")
-
A. Triulzi. The Jedi Packet Trick takes over the Deathstar (or: "taking NIC backdoors to the next level"). In CanSecWest/core, 2010.
-
(2010)
CanSecWest/core
-
-
Triulzi, A.1
-
63
-
-
84875249313
-
-
Technical Report CMU-CyLab-11-023, Carnegie Mellon University
-
A. Vasudevan, E. Owusu, Z. Zhou, J. Newsome, and J. M. McCune. Trustworthy execution on mobile devices: What security properties can my mobile platform give me? Technical Report CMU-CyLab-11-023, Carnegie Mellon University, 2011.
-
(2011)
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
-
-
Vasudevan, A.1
Owusu, E.2
Zhou, Z.3
Newsome, J.4
McCune, J.M.5
-
64
-
-
49249126891
-
The zurich trusted information channel - An efficient defence against man-in-the-middle and malicious software attacks
-
T. Weigold, T. Kramp, R. Hermann, F. Höring, P. Buhler, and M. Baentsch. The zurich trusted information channel - an efficient defence against man-in-the-middle and malicious software attacks. In Proc. International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications, 2008.
-
Proc. International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications, 2008
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
Höring, F.4
Buhler, P.5
Baentsch, M.6
|