-
1
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the ACM conference on Computer and Communications Security, CCS, pages 38-49, 2010.
-
(2010)
Proceedings of the ACM Conference on Computer and Communications Security, CCS
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
2
-
-
54249122693
-
TOC-TOU, traps, and trusted computing
-
S. Bratus, N. D'Cunha, E. Sparks, and S. W. Smith. TOC-TOU, traps, and trusted computing. In Proceedings of the International Conference on Trusted Computing and Trust in Information Technologies, Trust, pages 14-32, 2008.
-
(2008)
Proceedings of the International Conference on Trusted Computing and Trust in Information Technologies, Trust
, pp. 14-32
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.W.4
-
3
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
C. Castelluccia, A. Francillon, D. Perito, and C. Soriente. On the difficulty of software-based attestation of embedded devices. In Proceedings of the ACM conference on Computer and Communications Security, CCS, pages 400-409, 2009.
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security, CCS
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
4
-
-
38049155586
-
Proactive code verification protocol in wireless sensor network
-
ICCSA
-
Y. Choi, J. Kang, and D. Nyang. Proactive code verification protocol in wireless sensor network. In Proceedings of the International Conference on Computational Science and its Applications - Volume Part II, ICCSA, pages 1085-1096, 2007.
-
(2007)
Proceedings of the International Conference on Computational Science and Its Applications
, Issue.PART II
, pp. 1085-1096
-
-
Choi, Y.1
Kang, J.2
Nyang, D.3
-
6
-
-
85175129431
-
-
Accessed: 10/21/2011
-
Geeks3D. Aogenmark 1.3.0: Simple multi-core cpu benchmark. 2011, http://www.geeks3d.com/20110513/aogenmark-1-3-0-simple-multi-core-cpu-benchmark. Accessed: 10/21/2011.
-
(2011)
Aogenmark 1.3.0: Simple Multi-core Cpu Benchmark
-
-
-
8
-
-
77950853188
-
Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction. In Proceedings of the ACM conference on Computer and Communications Security, CCS, pages 128-138, 2007.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security, CCS
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
11
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
J. M. McCune, B. Parno, A. Perrig, Michael K. Reiter, and Hiroshi Isozaki. Flicker: An execution infrastructure for tcb minimization. In Proceedings of the ACM European Conference in Computer Systems (EuroSys), April 2008.
-
Proceedings of the ACM European Conference in Computer Systems (EuroSys), April 2008
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
12
-
-
85175131623
-
-
September 7th Accessed: 11/01/2011
-
Microsoft. Ndis drivers (ndis 5.1) (windows driver kit). September 7th 2011, http://msdn.microsoft.com/en-us/Library/ff556938(v=VS.85).aspx. Accessed: 11/01/2011.
-
(2011)
Ndis Drivers (Ndis 5.1) (Windows Driver Kit)
-
-
-
15
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
SSYM
-
N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM, pages 13-13, 2004.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 13-13
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
16
-
-
39149110948
-
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
-
DOI 10.1016/j.entcs.2007.10.014, PII S1571066108000492
-
D. Schellekens, B.Wyseur, and B. Preneel. Remote attestation on legacy operating systems with trusted platform modules. Electron. Notes Theor. Comput. Sci., 197:59-72, February 2008. (Pubitemid 351253793)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 59-72
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
18
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure code update by attestation in sensor networks. In Proceedings of the ACM workshop on Wireless security, WiSe, pages 85-94, 2006.
-
(2006)
Proceedings of the ACM Workshop on Wireless Security, WiSe
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
19
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of ACM SIGOPS symposium on Operating systems principles, SOSP, pages 335-350, 2007.
-
(2007)
Proceedings of ACM SIGOPS Symposium on Operating Systems Principles, SOSP
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
20
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the ACM symposium on Operating systems principles, SOSP, pages 1-16, 2005.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles, SOSP
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
23
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim. Remote software-based attestation for wireless sensors. In ESAS, pages 27-41, 2005.
-
(2005)
ESAS
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
24
-
-
85084162788
-
Side effects are not sufficient to authenticate software
-
U. Shankar, M. Chew, and J. D. Tygar. Side effects are not sufficient to authenticate software. In Proceedings of the conference on USENIX Security Symposium, SSYM, pages 7-7, 2004.
-
(2004)
Proceedings of the Conference on USENIX Security Symposium, SSYM
, pp. 7-7
-
-
Shankar, U.1
Chew, M.2
Tygar, J.D.3
-
25
-
-
84878374769
-
-
Accessed: 10/21/2011
-
L. Ventura. Iperf on windows. 2010, http://linhost.info/2010/02/iperf-on- windows/. Accessed: 10/21/2011.
-
(2010)
Iperf on Windows
-
-
Ventura, L.1
-
26
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
New York, NY, USA, ACM
-
Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 545-554, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
28
-
-
79956031885
-
A software-based root-of-trust primitive on multicore platforms
-
Q. Yan, J. Han, Y. Li, R. H. Deng, and T. Li. A software-based root-of-trust primitive on multicore platforms. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, ASIACCS, pages 334-343, 2011.
-
(2011)
Proceedings of the ACM Symposium on Information, Computer and Communications Security, ASIACCS
, pp. 334-343
-
-
Yan, Q.1
Han, J.2
Li, Y.3
Deng, R.H.4
Li, T.5
|