-
2
-
-
4043168634
-
The IBM PCIXCC: A new cryptographic coprocessor for the IBM eserver
-
Arnold, T.W., Van Doom, L.P.: The IBM PCIXCC: a new cryptographic coprocessor for the IBM eserver. IBM J. Res. Dev. 48(3-4), 475-487 (2004)
-
(2004)
IBM J. Res. Dev.
, vol.48
, Issue.3-4
, pp. 475-487
-
-
Arnold, T.W.1
Van Doom, L.P.2
-
3
-
-
77950820630
-
HIMA: A hypervisor-based integrity measurement agent
-
IEEE Computer Society, Washington, DC
-
Azab, A.M., Ning, P., Sezer, E.C., Zhang, X.: HIMA: A hypervisor-based integrity measurement agent. In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 461-470. IEEE Computer Society, Washington, DC (2009)
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009
, pp. 461-470
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
Zhang, X.4
-
4
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
ACM, New York
-
Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 38-49. ACM, New York (2010)
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
5
-
-
77958129275
-
New security architectures based on emerging disk functionality
-
September
-
Butler, K.R.B.,McLaughlin, S., Moyer, T.,McDaniel, P.D.: New security architectures based on emerging disk functionality. IEEE Security and Privacy Magazine (September 2010)
-
(2010)
IEEE Security and Privacy Magazine
-
-
Butler, K.R.B.1
McLaughlin, S.2
Moyer, T.3
McDaniel, P.D.4
-
6
-
-
77952579228
-
Scalable architectural support for trusted software
-
Jacob, M.T., Das, C.R., Bose, P. (eds.) IEEE Computer Society
-
Champagne, D., Lee, R.B.: Scalable architectural support for trusted software. In: Jacob, M.T., Das, C.R., Bose, P. (eds.) HPCA, pp. 1-12. IEEE Computer Society (2010)
-
(2010)
HPCA
, pp. 1-12
-
-
Champagne, D.1
Lee, R.B.2
-
7
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Christopher Lewis, E., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008, Seattle, WA, USA (March 2008)
-
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008, Seattle, WA, USA (March 2008)
-
-
Chen, X.1
Garfinkel, T.2
Christopher Lewis, E.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
8
-
-
84863085822
-
Virtualization based password protection against malware in untrusted operating systems
-
Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. Springer, Heidelberg
-
Cheng, Y., Ding, X.: Virtualization based password protection against malware in untrusted operating systems. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 201-218. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7344
, pp. 201-218
-
-
Cheng, Y.1
Ding, X.2
-
9
-
-
80052985363
-
Driverguard: A fine-grained protection on I/O flows
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
Cheng, Y., Ding, X., Deng, R.H.: Driverguard: a fine-grained protection on I/O flows. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 227-244. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 227-244
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
10
-
-
85073002683
-
SMART: Secure andMinimal Architecture for (Establishing a Dynamic) Root of Trust
-
Eldefrawy, K., Francillon, A., Perito, D., Tsudik, G.: SMART: Secure andMinimal Architecture for (Establishing a Dynamic) Root of Trust. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium, San Diego, USA, February 5-8 (2012)
-
Proceedings of the 19th Annual Network and Distributed System Security Symposium, San Diego, USA, February 5-8 (2012)
-
-
Eldefrawy, K.1
Francillon, A.2
Perito, D.3
Tsudik, G.4
-
12
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM, New York
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the 9th ACM Symposium on Operating Systems Principles, pp. 193-206. ACM, New York (2003)
-
(2003)
Proceedings of the 9th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
13
-
-
84884642012
-
Transparent protection of commodity OS kernels using hardware virtualization
-
Jajodia, S., Zhou, J. (eds.) SecureComm 2010. Springer, Heidelberg
-
Grace, M., Wang, Z., Srinivasan, D., Li, J., Jiang, X., Liang, Z., Liakh, S.: Transparent protection of commodity OS kernels using hardware virtualization. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 162-180. Springer, Heidelberg (2010)
-
(2010)
LNICST
, vol.50
, pp. 162-180
-
-
Grace, M.1
Wang, Z.2
Srinivasan, D.3
Li, J.4
Jiang, X.5
Liang, Z.6
Liakh, S.7
-
14
-
-
0003722586
-
-
Hewleet-Packard, Intel, Microsoft, Phoenix, and Toshiba. (Revision 3.0b) October
-
Hewleet-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification. (Revision 3.0b) (October 2006)
-
(2006)
Advanced Configuration and Power Interface Specification
-
-
-
19
-
-
77954969841
-
Nohype: Virtualized cloud infrastructure without the virtualization
-
ACM, New York
-
Keller, E., Szefer, J., Rexford, J., Lee, R.B.: Nohype: virtualized cloud infrastructure without the virtualization. In: Proceedings of the 37th Annual International Symposium on Computer Architecture, ISCA 2010, pp. 350-361. ACM, New York (2010)
-
(2010)
Proceedings of the 37th Annual International Symposium on Computer Architecture, ISCA 2010
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
20
-
-
80755144042
-
Viper: Verifying the integrity of peripherals' firmware
-
ACM, New York
-
Li, Y., McCune, J.M., Perrig, A.: Viper: verifying the integrity of peripherals' firmware. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 3-16. ACM, New York (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011
, pp. 3-16
-
-
Li, Y.1
McCune, J.M.2
Perrig, A.3
-
21
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
IEEE Computer Society, Washington, DC
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: Trustvisor: Efficient TCB reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 143-158. IEEE Computer Society, Washington, DC (2010)
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
22
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An execution infrastructure for TCB minimization. In: Proceedings of the ACM European Conference in Computer Systems (EuroSys) (April 2008)
-
Proceedings of the ACM European Conference in Computer Systems (EuroSys) (April 2008)
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
23
-
-
77950857042
-
Protecting kernel code and data with a virtualizationaware collaborative operating system
-
IEEE Computer Society, Washington, DC
-
de Oliveira, D.A.S., Felix Wu, S.: Protecting kernel code and data with a virtualizationaware collaborative operating system. In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 451-460. IEEE Computer Society, Washington, DC (2009)
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009
, pp. 451-460
-
-
De Oliveira, D.A.S.1
Felix Wu, S.2
-
26
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
27
-
-
34247361254
-
Scuba: Secure code update by attestation in sensor networks
-
ACM, New York
-
Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Scuba: Secure code update by attestation in sensor networks. In: Proceedings of the 5th ACM Workshop on Wireless Security, WiSe 2006, pp. 85-94. ACM, New York (2006)
-
(2006)
Proceedings of the 5th ACM Workshop on Wireless Security, WiSe 2006
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
28
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
ACM, New York
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 335-350. ACM, New York (2007)
-
(2007)
Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
29
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
ACM, New York
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, SOSP 2005, pp. 1-16. ACM, New York (2005)
-
(2005)
Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, SOSP 2005
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
30
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.K.: SWATT: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy (2004)
-
IEEE Symposium on Security and Privacy (2004)
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
31
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing I/O device security
-
ACM, New York
-
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y., Kato, K.: Bitvisor: a thin hypervisor for enforcing I/O device security. In: Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2009, pp. 121-130. ACM, New York (2009)
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2009
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
32
-
-
56549109177
-
Tamper-resistant, application-aware blocking of malicious network connections
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Srivastava, A., Giffin, J.: Tamper-resistant, application-aware blocking of malicious network connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39-58. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 39-58
-
-
Srivastava, A.1
Giffin, J.2
-
34
-
-
84869412964
-
Fides: Selectively hardening software application components against kernel-level or process-level malware
-
ACM, New York
-
Strackx, R., Piessens, F.: Fides: selectively hardening software application components against kernel-level or process-level malware. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 2-13. ACM, New York (2012)
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012
, pp. 2-13
-
-
Strackx, R.1
Piessens, F.2
-
35
-
-
84904654800
-
SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes
-
Sun, K., Wang, J., Zhang, F., Stavrou, A.: SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium, San Diego, California, USA (2012)
-
Proceedings of the 19th Annual Network and Distributed System Security Symposium, San Diego, California, USA (2012)
-
-
Sun, K.1
Wang, J.2
Zhang, F.3
Stavrou, A.4
-
37
-
-
77952371831
-
-
Trusted Computing Group: Version 1.2 rev. 85 February
-
Trusted Computing Group: TPM main specification. Main Specification Version 1.2 rev. 85 (February 2005)
-
(2005)
TPM Main Specification. Main Specification
-
-
-
38
-
-
80755186325
-
-
(CMU-Cylab-09-011)
-
Vasudevan, A., Parno, B., Qu, N., Gligor, V.D., Perrig, A.: Lockdown: A safe and practical environment for security applications (CMU-Cylab-09-011) (2009)
-
(2009)
Lockdown: A Safe and Practical Environment for Security Applications
-
-
Vasudevan, A.1
Parno, B.2
Qu, N.3
Gligor, V.D.4
Perrig, A.5
-
39
-
-
78249271707
-
HyperCheck: A hardware-assisted integrity monitor
-
Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
-
Wang, J., Stavrou, A., Ghosh, A.: HyperCheck: A hardware-assisted integrity monitor. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 158-177. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6307
, pp. 158-177
-
-
Wang, J.1
Stavrou, A.2
Ghosh, A.3
-
40
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
IEEE Computer Society, Washington, DC
-
Wang, Z., Jiang, X.: Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 380-395. IEEE Computer Society, Washington, DC (2010)
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
41
-
-
56549113546
-
Countering persistent kernel rootkits through systematic hook discovery
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Wang, Z., Jiang, X., Cui, W., Wang, X.: Countering persistent kernel rootkits through systematic hook discovery. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 21-38. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 21-38
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
43
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a perpage basis
-
ACM, New York
-
Yang, J., Shin, K.G.: Using hypervisor to provide data secrecy for user applications on a perpage basis. In: Proceedings of the Fourth ACMSIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2008, pp. 71-80. ACM, New York (2008)
-
(2008)
Proceedings of the Fourth ACMSIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2008
, pp. 71-80
-
-
Yang, J.1
Shin, K.G.2
-
44
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
Zhou, Z., Gligor, V.D., Newsome, J.,McCune, J.M.: Building verifiable trusted path on commodity x86 computers. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2012)
-
Proceedings of the IEEE Symposium on Security and Privacy (May 2012)
-
-
Zhou, Z.1
Gligor, V.D.2
Newsome, J.3
McCune, J.M.4
|