-
1
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
ACM, New York
-
Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., and Skalsky, N. C. 2010. Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). ACM, New York, 38-49.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., and Warfield, A. 2003. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03). ACM, New York, 164-177. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
3
-
-
78249272530
-
Securing network input via a trusted input proxy
-
USENIX Association, Berkeley, CA
-
Borders, K. and Prakash, A. 2007. Securing network input via a trusted input proxy. In Proceedings of the 2nd USENIX Workshop on Hot Topics in Security (HOTSEC'07). USENIX Association, Berkeley, CA, 7:1-7:5.
-
(2007)
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security (HOTSEC'07)
, vol.7
, Issue.1-7
, pp. 5
-
-
Borders, K.1
Prakash, A.2
-
4
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
P. Syverson and S. Jha Eds. ACM
-
Buchanan, E., Roemer, R., Shacham, H., and Savage, S. 2008. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proceedings of CCS'08. P. Syverson and S. Jha Eds., ACM, 27-38.
-
(2008)
Proceedings of CCS'08
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
5
-
-
78650032454
-
Returnoriented programming without returns
-
A. Keromytis and V. Shmatikov Eds. ACM
-
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-R., Shacham, H., and Winandy, M. 2010. Returnoriented programming without returns. In Proceedings of CCS'10. A. Keromytis and V. Shmatikov Eds., ACM, 559-72.
-
(2010)
Proceedings of CCS'10
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
6
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Lewis, E. C., Subrahmanyam, P., Waldspurger, C. A., Boneh, D., Dwoskin, J., and Ports, D. R. K. 2008. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'08).
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'08)
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
7
-
-
80052985363
-
Driverguard: A fine-grained protection on I/O flows
-
Springer-Verlag, Berlin
-
Cheng, Y., Ding, X., and Deng, R. H. 2011. Driverguard: A fine-grained protection on I/O flows. In Proceedings of the 16th European Conference on Research in Computer Security (ESORICS'11). Springer-Verlag, Berlin, 227-244.
-
(2011)
Proceedings of the 16th European Conference on Research in Computer Security (ESORICS'11)
, pp. 227-244
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
8
-
-
79959617325
-
Secureme: A hardware-software approach to full system security
-
ACM, New York
-
Chhabra, S., Rogers, B., Solihin, Y., and Prvulovic, M. 2011. Secureme: A hardware-software approach to full system security. In Proceedings of the International Conference on Supercomputing (ICS'11). ACM, New York, 108-119.
-
(2011)
Proceedings of the International Conference on Supercomputing (ICS'11)
, pp. 108-119
-
-
Chhabra, S.1
Rogers, B.2
Solihin, Y.3
Prvulovic, M.4
-
9
-
-
0036041421
-
An empirical study of operating systems errors
-
DOI 10.1145/502059.502042
-
Chou, A., Yang, J., Chelf, B., Hallem, S., and Engler, D. 2001. An empirical study of operating systems errors. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01). ACM, New York, 73-88. (Pubitemid 33612606)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
10
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
ACM, New York
-
Colp, P., Nanavati, M., Zhu, J., Aiello, W., Coker, G., Deegan, T., Loscocco, P., and Warfield, A. 2011. Breaking up is hard to do: Security and functionality in a commodity hypervisor. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11). ACM, New York, 189-202.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11)
, pp. 189-202
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
11
-
-
84885923310
-
-
CVE-2008-0923. 2008http://cve.mitre.org/cgi-bin/cvename.cgi-?name=cve- 2008-0923.
-
(2008)
-
-
-
12
-
-
84977840356
-
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
-
USENIX Association, Berkeley, CA
-
Dunn, A. M., Lee, M. Z., Jana, S., Kim, S., Silberstein, M., Xu, Y., Shmatikov, V., and Witchel, E. 2012. Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12). USENIX Association, Berkeley, CA, 61-75.
-
(2012)
Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)
, pp. 61-75
-
-
Dunn, A.M.1
Lee, M.Z.2
Jana, S.3
Kim, S.4
Silberstein, M.5
Xu, Y.6
Shmatikov, V.7
Witchel, E.8
-
13
-
-
80051945078
-
Uni-directional trusted path: Transaction confirmation on just one device
-
Filyanov, A., McCune, J. M., Sadeghi, A.-R., and Winandy, M. 2011. Uni-directional trusted path: Transaction confirmation on just one device. In Proceedings of the IEEE/IFIP Conference on Dependable Systems and Networks.
-
(2011)
Proceedings of the IEEE/IFIP Conference on Dependable Systems and Networks
-
-
Filyanov, A.1
McCune, J.M.2
Sadeghi, A.-R.3
Winandy, M.4
-
14
-
-
84884651478
-
Accessing PCI express configuration registers using intel chipsets
-
Fleming, S. 2008. Accessing PCI express configuration registers using intel chipsets. Tech. rep., Intel Corporation, http://www.intel.com/content/www/ us/en/intelligent-systems/chipsets-pcie-configreg-paper.html.
-
(2008)
Tech. Rep., Intel Corporation
-
-
Fleming, S.1
-
15
-
-
77957808684
-
The design and implementation of micro drivers
-
ACM, New York
-
Ganapathy, V., Renzelmann, M. J., Balakrishnan, A., Swift, M. M., and Jha, S. 2008. The design and implementation of microdrivers. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII). ACM, New York, 168-178.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII)
, pp. 168-178
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
16
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM, New York
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. 2003. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 9th ACMSymposium on Operating Systems Principles. ACM, New York, 93-206.
-
(2003)
Proceedings of the 9th ACMSymposium on Operating Systems Principles
, pp. 93-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
18
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
DOI 10.1145/1180405.1180448, 1180448, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Heitmeyer, C. L., Archer, M., Leonard, E. I., and McLean, J. 2006. Formal specification and verification of data separation in a separation kernel for an embedded system. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06). ACM, New York, 346-355. (Pubitemid 47131382)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
20
-
-
84878497056
-
LIBDFT: Practical dynamic data flow tracking for commodity systems
-
ACM, New York
-
Kemerlis, V. P., Portokalidis, G., Jee, K., and Keromytis, A. D. 2012. LIBDFT: Practical dynamic data flow tracking for commodity systems. In Proceedings of the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'12). ACM, New York, 121-132.
-
(2012)
Proceedings of the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'12)
, pp. 121-132
-
-
Kemerlis, V.P.1
Portokalidis, G.2
Jee, K.3
Keromytis, A.D.4
-
21
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
DOI 10.1109/SP.2006.38, 1624022, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
King, S. T., Chen, P. M., Wang, Y.-M., Verbowski, C., Wang, H. J., and Lorch, J. R. 2006. Subvirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, 314-327. (Pubitemid 44753733)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
22
-
-
84885944956
-
SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes
-
Kun, S., Jiang, W., Fengwei, Z., and Angelos, S. 2012. SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS).
-
(2012)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS)
-
-
Kun, S.1
Jiang, W.2
Fengwei, Z.3
Angelos, S.4
-
24
-
-
80755144042
-
Viper: Verifying the integrity of peripherals' firmware
-
ACM, New York
-
Li, Y., McCune, J. M., and Perrig, A. 2011. Viper: Verifying the integrity of peripherals' firmware. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11). ACM, New York, 3-16.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
, pp. 3-16
-
-
Li, Y.1
McCune, J.M.2
Perrig, A.3
-
25
-
-
80054850540
-
Malicious code injection via/dev/mem
-
Lineberry, A. 2009. Malicious code injection via/dev/mem. In Black Hat.
-
(2009)
Black Hat
-
-
Lineberry, A.1
-
26
-
-
85077302433
-
Bump in the ether: A framework for securing sensitive user input
-
USENIX Association, Berkeley, CA
-
McCune, J.M., Perrig, A., and Reiter, M. K. 2006. Bump in the ether: A framework for securing sensitive user input. In Proceedings of the Annual Conference on USENIX'06 Annual Technical Conference. USENIX Association, Berkeley, CA, 17-17.
-
(2006)
Proceedings of the Annual Conference on USENIX'06 Annual Technical Conference
, pp. 17-17
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
27
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J. M., Parno, B., Perrig, A., Reiter, M. K., and Isozaki, H. 2008. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the ACM European Conference in Computer Systems (EuroSys).
-
(2008)
Proceedings of the ACM European Conference in Computer Systems (EuroSys)
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
29
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
IEEE Computer Society, Los Alamitos, CA
-
McCune, J. M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., and Perrig, A. 2010. Trustvisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (SP'10). IEEE Computer Society, Los Alamitos, CA, 143-158.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy (SP'10)
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
30
-
-
0038011042
-
Improving program slicing with dynamic points-to data
-
Mock, M., Atkinson, D. C., Chambers, C., and Eggers, S. J. 2002. Improving program slicing with dynamic points-to data. SIGSOFT Softw. Eng. Notes 27, 6, 71-80.
-
(2002)
SIGSOFT Softw. Eng. Notes
, vol.27
, Issue.6
, pp. 71-80
-
-
Mock, M.1
Atkinson, D.C.2
Chambers, C.3
Eggers, S.J.4
-
31
-
-
79953672829
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
Newsome, J. and Song, D. 2005. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Proceedings of the Network and Distributed Systems Security Symposium.
-
(2005)
Proceedings of the Network and Distributed Systems Security Symposium
-
-
Newsome, J.1
Song, D.2
-
32
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
IEEE Computer Society, Los Alamitos, CA
-
Payne, B. D., Carbone, M., Sharif, M., and Lee, W. 2008. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, 233-247.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
35
-
-
84884994237
-
-
Tech. rep
-
Santelices, R., Zhang, Y., Jiang, S., Cai, H., and jie Zhang, Y. 2012. Quantitative program slicing: Separating statements by relevance. Tech. rep.
-
(2012)
Quantitative Program Slicing: Separating Statements by Relevance
-
-
Santelices, R.1
Zhang, Y.2
Jiang, S.3
Cai, H.4
Jie Zhang, Y.5
-
36
-
-
77951609662
-
I am a sensor, and I approve this message
-
ACM, New York
-
Saroiu, S. and Wolman, A. 2010. I am a sensor, and I approve this message. In Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile'10). ACM, New York, 37-42.
-
(2010)
Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (Hot Mobile'10)
, pp. 37-42
-
-
Saroiu, S.1
Wolman, A.2
-
37
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
DOI 10.1145/1294261.1294294, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
Seshadri, A., Luk, M., Qu, N., and Perrig, A. 2007. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07). ACM, New York, 335-350. (Pubitemid 351429386)
-
(2007)
Operating Systems Review (ACM)
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
38
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
S. De Capitani di Vimercati and P. Syverson Eds. ACM
-
Shacham, H. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of CCS'07. S. De Capitani di Vimercati and P. Syverson Eds., ACM, 552-61.
-
(2007)
Proceedings of CCS'07
, pp. 552-561
-
-
Shacham, H.1
-
39
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Shi, E., Perrig, A., and Doorn, L. V. 2005. BIND: A fine-grained attestation service for secure distributed systems. In Proceedings of the IEEE Symposium on Security and Privacy. 154-168. (Pubitemid 41543653)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doom, L.3
-
40
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing I/O device security
-
ACM, New York
-
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y., and Kato, K. 2009. Bitvisor: A thin hypervisor for enforcing I/O device security. In Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE'09). ACM, New York, 121-130.
-
(2009)
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE'09)
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
41
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
USENIX Association, Berkeley, CA
-
Song, D. X., Wagner, D., and Tian, X. 2001. Timing analysis of keystrokes and timing attacks on ssh. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01). USENIX Association, Berkeley, CA, 25-25.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01)
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
42
-
-
35448962507
-
Thin slicing
-
DOI 10.1145/1250734.1250748, PLDI'07: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
Sridharan, M., Fink, S. J., and Bodik, R. 2007. Thin slicing. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'07). ACM, New York, 112-122. (Pubitemid 47630680)
-
(2007)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
, pp. 112-122
-
-
Sridharan, M.1
Fink, S.J.2
Bodik, R.3
-
43
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Swift, M. M., Bershad, B. N., and Levy, H. M. 2003. Improving the reliability of commodity operating systems. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03). ACM, New York, 207-222. (Pubitemid 40929698)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
44
-
-
84885945169
-
-
The Blue Pill. http://blackhat.com/presentations/bh-usa-06/BH-US-06- Rutkowska.pdf.
-
The Blue Pill
-
-
-
45
-
-
84863111808
-
Lockdown: Towards a safe and practical architecture for security applications on commodity platforms
-
Springer-Verlag, Berlin
-
Vasudevan, A., Parno, B., Qu, N., Gligor, V. D., and Perrig, A. 2012. Lockdown: Towards a safe and practical architecture for security applications on commodity platforms. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST'12). Springer-Verlag, Berlin, 34-54.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST'12)
, pp. 34-54
-
-
Vasudevan, A.1
Parno, B.2
Qu, N.3
Gligor, V.D.4
Perrig, A.5
-
46
-
-
78249271707
-
Hypercheck: A hardware-assisted integrity monitor
-
Springer-Verlag, Berlin
-
Wang, J., Stavrou, A., and Ghosh, A. 2010. Hypercheck: A hardware-assisted integrity monitor. In Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection (RAID'10). Springer-Verlag, Berlin, 158-177.
-
(2010)
Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection (RAID'10)
, pp. 158-177
-
-
Wang, J.1
Stavrou, A.2
Ghosh, A.3
-
47
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
IEEE Computer Society, Los Alamitos, CA
-
Wang, Z. and Jiang, X. 2010. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proceedings of the IEEE Symposium on Security and Privacy (SP'10). IEEE Computer Society, Los Alamitos, CA, 380-395.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy (SP'10)
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
48
-
-
0003805545
-
-
Ph.D. thesis, AAI8007856, Ann Arbor, MI
-
Weiser, M. D. 1979. Program slices: Formal, psychological, and practical investigations of an automatic program abstraction method. Ph.D. thesis, AAI8007856, Ann Arbor, MI.
-
(1979)
Program Slices: Formal, Psychological, and Practical Investigations of An Automatic Program Abstraction Method
-
-
Weiser, M.D.1
-
49
-
-
80051967189
-
Phonotactic reconstruction of encrypted VOIP conversations: Hookt on fon-iks
-
IEEE Computer Society, Los Alamitos, CA
-
White, A. M., Matthews, A. R., Snow, K. Z., and Monrose, F. 2011. Phonotactic reconstruction of encrypted VOIP conversations: Hookt on fon-iks. In Proceedings of the IEEE Symposium on Security and Privacy (SP'11). IEEE Computer Society, Los Alamitos, CA, 3-18.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy (SP'11)
, pp. 3-18
-
-
White, A.M.1
Matthews, A.R.2
Snow, K.Z.3
Monrose, F.4
-
52
-
-
23244459906
-
Trusted paths for browsers
-
DOI 10.1145/1065545.1065546
-
Ye, Z. E., Smith, S., and Anthony, D. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8, 2, 153-186. (Pubitemid 41092670)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.1
Smith, S.2
Anthony, D.3
-
53
-
-
84908296347
-
Safe drive: Safe and recoverable extensions using language-based techniques
-
USENIX Association, Berkeley, CA
-
Zhou, F., Condit, J., Anderson, Z., Bagrak, I., Ennals, R., Harren, M., Necula, G., and Brewer, E. 2006. Safe drive: Safe and recoverable extensions using language-based techniques. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI'06). USENIX Association, Berkeley, CA, 45-60.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI'06)
, pp. 45-60
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.7
Brewer, E.8
-
54
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
Zhou, Z., Gligor, V. D., Newsome, J., and McCune, J. M. 2012. Building verifiable trusted path on commodity x86 computers. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Zhou, Z.1
Gligor, V.D.2
Newsome, J.3
McCune, J.M.4
|