-
1
-
-
84881242393
-
-
Aufs. http://aufs.sourceforge.net/.
-
-
-
-
2
-
-
84881250545
-
-
BitLocker. http://windows.microsoft.com/en-US/windows7/products/features/ bitlocker.
-
BitLocker
-
-
-
3
-
-
84881233415
-
-
Bonnie++. http://www.coker.com.au/bonnie++/.
-
Bonnie++
-
-
-
4
-
-
84881258830
-
-
dm-crypt. http://code.google.com/p/cryptsetup/wiki/DMCrypt.
-
dm-crypt
-
-
-
5
-
-
84881242133
-
-
eCryptfs. https://launchpad.net/ecryptfs.
-
eCryptfs
-
-
-
6
-
-
84881239892
-
-
EncFS. www.arg0.net/encfs.
-
EncFS
-
-
-
7
-
-
84881232296
-
-
Overlayfs. http://git.kernel.org/?p=linux/kernel/git/mszeredi/vfs.git.
-
Overlayfs
-
-
-
10
-
-
84881238226
-
-
Unionfs. http://unionfs.filesystems.org/.
-
-
-
-
11
-
-
84881235117
-
-
xdotool. http://www.semicomplete.com/projects/xdotool/xdotool.xhtml.
-
xdotool
-
-
-
12
-
-
84882750204
-
An Analysis of Private Browsing Modes in Modern Browsers
-
USENIX Association
-
G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh. An Analysis of Private Browsing Modes in Modern Browsers. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2010. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2010
-
-
Aggarwal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
14
-
-
85084163253
-
Secure Data Deletion for Linux File Systems
-
USENIX Association
-
S. Bauer and N. B. Priyantha. Secure Data Deletion for Linux File Systems. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2001. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2001
-
-
Bauer, S.1
Priyantha, N.B.2
-
16
-
-
85084162908
-
A Revocable Backup System
-
USENIX Association
-
D. Boneh and R. J. Lipton. A Revocable Backup System. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 1996. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 1996
-
-
Boneh, D.1
Lipton, R.J.2
-
17
-
-
84870682965
-
Protecting Confidential Data on Personal Computers with Storage Capsules
-
USENIX Association
-
K. Borders, E. V. Weele, B. Lau, and A. Prakash. Protecting Confidential Data on Personal Computers with Storage Capsules. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2009. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2009
-
-
Borders, K.1
Weele, E.V.2
Lau, B.3
Prakash, A.4
-
18
-
-
84889030419
-
Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation
-
J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2005. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2005 USENIX Association
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
20
-
-
84977840356
-
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels
-
USENIX Association
-
A. M. Dunn, M. Z. Lee, S. Jana, S. Kim, M. Silberstein, Y. Xu, V. Shmatikov, and E. Witchel. Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation, Berkeley, CA, USA, 2012. USENIX Association.
-
Proceedings of the USENIX Conference on Operating Systems Design and Implementation, Berkeley, CA, USA, 2012
-
-
Dunn, A.M.1
Lee, M.Z.2
Jana, S.3
Kim, S.4
Silberstein, M.5
Xu, Y.6
Shmatikov, V.7
Witchel, E.8
-
21
-
-
0034449227
-
Timing Attacks on Web Privacy
-
ACM
-
E. W. Felten and M. A. Schneider. Timing Attacks on Web Privacy. In Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, USA, 2000. ACM.
-
Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, USA, 2000
-
-
Felten, E.W.1
Schneider, M.A.2
-
22
-
-
85077701725
-
Lest We Remember: Cold Boot Attacks on Encryption Keys
-
USENIX Association
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2008. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2008
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
23
-
-
39049086327
-
Back to the Future: A Framework for Automatic Malware Removal and System Repair
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su. Back to the Future: A Framework for Automatic Malware Removal and System Repair. In Proceedings of the Annual Computer Security Applications Conference, 2006.
-
Proceedings of the Annual Computer Security Applications Conference, 2006
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
24
-
-
34250634485
-
Protecting Browser State from Web Privacy Attacks
-
ACM
-
C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting Browser State from Web Privacy Attacks. In Proceedings of the International World Wide Web Conference, New York, NY, USA, 2006. ACM.
-
Proceedings of the International World Wide Web Conference, New York, NY, USA, 2006
-
-
Jackson, C.1
Bortz, A.2
Boneh, D.3
Mitchell, J.C.4
-
25
-
-
59249099704
-
Application-Level Isolation and Recovery with Solitude
-
ACM
-
S. Jain, F. Shafique, V. Djeric, and A. Goel. Application-Level Isolation and Recovery with Solitude. In Proceedings of the European Conference on Computer Systems, New York, NY, USA, 2008. ACM.
-
Proceedings of the European Conference on Computer Systems, New York, NY, USA, 2008
-
-
Jain, S.1
Shafique, F.2
Djeric, V.3
Goel, A.4
-
26
-
-
34250687159
-
Invasive Browser Sniffing and Countermeasures
-
ACM
-
M. Jakobsson and S. Stamm. Invasive Browser Sniffing and Countermeasures. In Proceedings of the International World Wide Web Conference, New York, NY, USA, 2006. ACM.
-
Proceedings of the International World Wide Web Conference, New York, NY, USA, 2006
-
-
Jakobsson, M.1
Stamm, S.2
-
27
-
-
80051954621
-
TxBox: Building Secure, Efficient Sandboxes with System Transactions
-
IEEE Computer Society
-
S. Jana, D. E. Porter, and V. Shmatikov. TxBox: Building Secure, Efficient Sandboxes with System Transactions. In Proceedings of the IEEE Symposium on Security and Privacy, Washington, DC, USA, 2011. IEEE Computer Society.
-
Proceedings of the IEEE Symposium on Security and Privacy, Washington, DC, USA, 2011
-
-
Jana, S.1
Porter, D.E.2
Shmatikov, V.3
-
29
-
-
34547403849
-
Secure Deletion Myths, Issues, and Solutions
-
ACM
-
N. Joukov, H. Papaxenopoulos, and E. Zadok. Secure Deletion Myths, Issues, and Solutions. In Proceedings of the ACM Workshop on Storage Security and Survivability, New York, NY, USA, 2006. ACM.
-
Proceedings of the ACM Workshop on Storage Security and Survivability, New York, NY, USA, 2006
-
-
Joukov, N.1
Papaxenopoulos, H.2
Zadok, E.3
-
30
-
-
60349104471
-
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
-
Z. Liang, W. Sun, V. N. Venkatakrishnan, and R. Sekar. Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Transactions on Information and System Security, 12(3):14:1-14:37, 2009.
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
-
-
Liang, Z.1
Sun, W.2
Venkatakrishnan, V.N.3
Sekar, R.4
-
31
-
-
33947166190
-
-
Technical report, Sun Microsystems, Inc., Mountain View, CA, USA
-
R. Perlman. The Ephemerizer: Making Data Disappear. Technical report, Sun Microsystems, Inc., Mountain View, CA, USA, 2005.
-
(2005)
The Ephemerizer: Making Data Disappear
-
-
Perlman, R.1
-
33
-
-
84874283560
-
Secure Deletion for a Versioning File System
-
USENIX Association
-
Z. N. J. Peterson, R. Burns, J. Herring, A. Stubblefield, and A. D. Rubin. Secure Deletion for a Versioning File System. In Proceedings of the USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, 2005. USENIX Association.
-
Proceedings of the USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, 2005
-
-
Peterson, Z.N.J.1
Burns, R.2
Herring, J.3
Stubblefield, A.4
Rubin, A.D.5
-
35
-
-
85073529809
-
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
-
USENIX Association
-
J. Reardon, S. Capkun, and D. Basin. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. In Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2012. USENIX Association.
-
Proceedings of the USENIX Security Symposium, Berkeley, CA, USA, 2012
-
-
Reardon, J.1
Capkun, S.2
Basin, D.3
-
36
-
-
79959957510
-
Forensic Analysis of Private Browsing Artifacts
-
H. Said, A. N. Mutawa, A. A. Ibtesam, and M. Guimaraes. Forensic Analysis of Private Browsing Artifacts. In Proceedings of the International Conference on Innovations in Information Technology, Abu Dhabi, United Arab Emirates, 2011.
-
Proceedings of the International Conference on Innovations in Information Technology, Abu Dhabi, United Arab Emirates, 2011
-
-
Said, H.1
Mutawa, A.N.2
Ibtesam, A.A.3
Guimaraes, M.4
-
37
-
-
34547367533
-
Doppelganger: Better Browser Privacy Without the Bother
-
ACM
-
U. Shankar and C. Karlof. Doppelganger: Better Browser Privacy Without the Bother. In Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, USA, 2006. ACM.
-
Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, USA, 2006
-
-
Shankar, U.1
Karlof, C.2
-
38
-
-
1142280988
-
AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
-
ACM
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In Proceedings of the Annual International Conference on Supercomputing, New York, NY, USA, 2003. ACM.
-
Proceedings of the Annual International Conference on Supercomputing, New York, NY, USA, 2003
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
39
-
-
84889034552
-
CleanOS: Limiting Mobile Data Exposure with Idle Eviction
-
USENIX Association
-
Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: Limiting Mobile Data Exposure with Idle Eviction. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation, Berkeley, CA, USA, 2012. USENIX Association.
-
Proceedings of the USENIX Conference on Operating Systems Design and Implementation, Berkeley, CA, USA, 2012
-
-
Tang, Y.1
Ames, P.2
Bhamidipati, S.3
Bijlani, A.4
Geambasu, R.5
Sarda, N.6
-
40
-
-
0034445599
-
Architectural Support for Copy and Tamper Resistant Software
-
ACM
-
D. L. C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, New York, NY, USA, 2000. ACM.
-
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, New York, NY, USA, 2000
-
-
Thekkath, D.L.C.1
Mitchell, M.2
Lincoln, P.3
Boneh, D.4
Mitchell, J.5
Horowitz, M.6
-
41
-
-
0012579128
-
-
Technical report, Computer Science Department, Columbia University
-
E. Zadok, I. Badulescu, and A. Shender. Cryptfs: A Stackable Vnode Level Encryption File System. Technical report, Computer Science Department, Columbia University, 1998.
-
(1998)
Cryptfs: A Stackable Vnode Level Encryption File System
-
-
Zadok, E.1
Badulescu, I.2
Shender, A.3
|