-
1
-
-
78650019783
-
HyperSentry: Enabling stealthy incontext measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, N. C. Skalsky, "HyperSentry: Enabling Stealthy Incontext Measurement of Hypervisor Integrity," in Proc. of the 17th ACM Conference on Computer and Communications Security, pp. 38-49, 2010.
-
(2010)
Proc. of the 17th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
2
-
-
79960751022
-
NIST special publication 800-146, draft cloud computing synopsis and recommendations
-
L. Badger, T. Grance, R. Patt-Corner, and J. Voas, "NIST special publication 800-146, draft cloud computing synopsis and recommendations," National Institute of Standards and Technology, 2011.
-
(2011)
National Institute of Standards and Technology
-
-
Badger, L.1
Grance, T.2
Patt-Corner, R.3
Voas, J.4
-
3
-
-
84877647337
-
An effective auditing scheme for cloud computing
-
Dec
-
R. Houlihan, and X. Du, "An Effective Auditing Scheme for Cloud Computing," in Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA, Dec. 2012.
-
(2012)
Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA
-
-
Houlihan, R.1
Du, X.2
-
4
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig, "TrustVisor: Efficient TCB reduction and attestation," in Proceedings of the IEEE Symposium on Security and Privacy, May 2010.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
5
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
March/April
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki, "Flicker: An execution infrastructure for TCB minimization," in Proc. of the ACM European Conference on Computer Systems (EuroSys), March/April 2008.
-
(2008)
Proc. of the ACM European Conference on Computer Systems (EuroSys)
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
6
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot-a coprocessor-based kernel runtime integrity monitor," in Proc. of the 13th USENIX Security Symposium, pp. 13, 2004.
-
(2004)
Proc. of the 13th USENIX Security Symposium
, pp. 13
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
7
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," In Proceedings of the 16th ACM conference on Computer and communications security, pp. 199-212. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
77952255373
-
Beyond the CPU: Defeating hardware based ram acquisition tools
-
February
-
J. Rutkowska, "Beyond the CPU: Defeating Hardware Based RAM Acquisition Tools," Blackhat, February 2007.
-
(2007)
Blackhat
-
-
Rutkowska, J.1
-
9
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
J. Szefer, E. Keller, R.B. Lee, and J. Rexford, "Eliminating the hypervisor attack surface for a more secure cloud," ACM CCS, 2011.
-
(2011)
ACM CCS
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
10
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense)
-
V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M.M. Swift, "Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)," ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
13
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M.K. Reiter, and T. Ristenpart, "Cross-VM side channels and their use to extract private keys," ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
14
-
-
84962558350
-
-
Metasploitable, http://sourceforge.net/projects/metasploitable/.
-
Metasploitable
-
-
-
15
-
-
84883509832
-
-
Metasploit, http://www.metasploit.com/.
-
Metasploit
-
-
-
16
-
-
84883504157
-
-
Backtrack-Linux, http://www.backtrack-linux.org/.
-
Backtrack-Linux
-
-
-
17
-
-
84883541885
-
-
Gephi Available
-
Gephi, Available: https://gephi.org.
-
-
-
-
18
-
-
84883496622
-
-
Open Mobile Terminal Platform Alliance
-
Open Mobile Terminal Platform Alliance, "OMTP Approved Deliverables," 2010, http://www.omtp.org/approved.html.
-
(2010)
OMTP Approved Deliverables
-
-
|