-
1
-
-
84897777225
-
-
Android. http://www.android.com.
-
Android
-
-
-
2
-
-
77957939810
-
-
Dalvik VM Internals. https://sites.google.com/site/io/dalvik-vm- internals.
-
Dalvik VM Internals
-
-
-
3
-
-
84897792724
-
-
Apple iOS 6. http://www.apple.com/ios.
-
Apple IOS 6
-
-
-
4
-
-
84897757882
-
-
Mono. http://www.mono-project.com/Main×Page/.
-
Mono
-
-
-
6
-
-
79953831269
-
-
.NET Micro Framework,. http://www.microsoft.com/netmf/default.mspx.
-
NET Micro Framework
-
-
-
7
-
-
84897813036
-
-
Proxama. http://www.proxama.com/ products-and-services/trustzone.
-
-
-
-
9
-
-
84897773132
-
-
Tegra 250 Dev Board. https://developer.nvidia.com/tegra-250-development- board-features/.
-
Tegra 250 Dev Board
-
-
-
10
-
-
84897754730
-
-
U-boot Bootloader. http://www.denx.de/en/News/WebHome/.
-
U-boot Bootloader
-
-
-
11
-
-
84897800574
-
-
Microsoft Windows 8. http://windows.microsoft.com/en-us/windows-8/meet.
-
Microsoft Windows 8
-
-
-
15
-
-
80755169488
-
SICE: A Hardware-level strongly isolated computing environment for x86 multi-core platforms
-
A.M. Azab, P. Ning, and X. Zhang. SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms. In Proc. of CCS, 2011.
-
(2011)
Proc. of CCS
-
-
Azab, A.M.1
Ning, P.2
Zhang, X.3
-
17
-
-
85084162921
-
Privtrans: Automatically partitioning programs for privilege separation
-
D. Brumley and D. Song. Privtrans: automatically partitioning programs for privilege separation. In Proc. of USENIX Security '04, 2004.
-
(2004)
Proc. of USENIX Security '04
-
-
Brumley, D.1
Song, D.2
-
18
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In Proc. of ASP-LOS, 2008.
-
(2008)
Proc. of ASP-LOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
19
-
-
70450092979
-
Secure web applications via automatic partitioning
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In Proc. of SOSP '07, 2007.
-
(2007)
Proc. of SOSP '07
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
20
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proc of OSDI'10, 2010.
-
(2010)
Proc of OSDI'10
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mc-Daniel, P.6
Sheth, A.N.7
-
21
-
-
4444318660
-
Terra: A Virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proc. of SOSP, 2003.
-
(2003)
Proc. of SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
23
-
-
33947691568
-
-
CollaborateCom
-
H. H'artig,M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The Nizza Secure-System Architecture. CollaborateCom, 2005.
-
(2005)
The Nizza Secure-System Architecture
-
-
Hartig, M.1
Hohmuth, H.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
26
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In Proc. of ASPLOS, 2000.
-
(2000)
Proc. of ASPLOS
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
28
-
-
55149108173
-
Flicker: An execution infrastructure for TCBMinimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCBMinimization. In Proc. of EuroSys, 2008.
-
(2008)
Proc. of EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
29
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. D. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proc. of IEEE S&P, 2010.
-
(2010)
Proc. of IEEE S&P
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
30
-
-
0001851744
-
JFlow: Practicalmostly-static information flow control
-
A. C.Myers. JFlow: PracticalMostly-Static Information Flow Control. In Proc. of POPL ?99, 1999.
-
(1999)
Proc. of POPL ? 99
-
-
Myers, A.C.1
-
31
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
B. Parno, J. R. Lorch, J. R. Douceur, J. Mickens, and J. M. Mccune. Memoir: Practical State Continuity for Protected Modules. In Proc. of IEEE S&P, 2011.
-
(2011)
Proc. of IEEE S&P
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
32
-
-
84897754727
-
-
PrivacyCA. PrivacyCA. http://privacyca.com.
-
PrivacyCA
-
-
-
33
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In Proc. of IEEE S&P, 2012.
-
(2012)
Proc. of IEEE S&P
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
34
-
-
84860709376
-
Trusted language runtime (TLR): Enabling trusted applications on smartphones
-
N. Santos, H. Raj, S. Saroiu, and A. Wolman. Trusted Language Runtime (TLR): Enabling Trusted Applications on Smartphones. In Proc. of HotMobile, 2011.
-
(2011)
Proc. of HotMobile
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
35
-
-
77954565496
-
Nova: A microhypervisor-based secure virtualization architecture
-
U. Steinberg and B. Kauer. Nova: A microhypervisor-based secure virtualization architecture. In Eurosys, 2010.
-
(2010)
Eurosys
-
-
Steinberg, U.1
Kauer, B.2
-
36
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In Proc. of ICS, 2003.
-
(2003)
Proc. of ICS
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
37
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems congurable
-
R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making Trust Between Applications and Operating Systems Congurable. In Proc. of OSDI, 2006.
-
(2006)
Proc. of OSDI
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
|