-
3
-
-
72449145808
-
Controlflow integrity principles, implementations, and applications
-
November
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Controlflow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur., 13:4:1-4:40, November 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 41-440
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
5
-
-
84897781978
-
Innovative technology for cpu based attestation and sealing
-
ACM
-
I. Anati, S. Gueron, S. Johnson, and V. Scarlata. Innovative technology for cpu based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, page 10. ACM, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
, pp. 10
-
-
Anati, I.1
Gueron, S.2
Johnson, S.3
Scarlata, V.4
-
7
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
New York, NY, USA,. ACM
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 38-49, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
8
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
Copper Mountain, CO, USA
-
B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Proc. ACM SIGOPS Symp. on Op. Sys. Principles, pages 267-284, Copper Mountain, CO, USA, 1995.
-
(1995)
Proc. ACM SIGOPS Symp. on Op. Sys. Principles
, pp. 267-284
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Becker, D.5
Fiuczynski, M.6
Chambers, C.7
Eggers, S.8
-
10
-
-
84875649201
-
Iago attacks: Why the system call API is a bad untrusted RPC interface
-
New York, NY, USA, ACM
-
S. Checkoway and H. Shacham. Iago attacks: why the system call API is a bad untrusted RPC interface. In Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, ASPLOS '13, pages 253-264, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13
, pp. 253-264
-
-
Checkoway, S.1
Shacham, H.2
-
11
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
New York, NY, USA, ACM
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, ASPLOS XIII, pages 2-13, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
13
-
-
41149167181
-
Secure virtual architecture: A safe execution environment for commodity operating systemS
-
Stevenson, WA, USA, October
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems. In Proc. ACM SIGOPS Symp. on Op. Sys. Principles, pages 351-366, Stevenson, WA, USA, October 2007.
-
(2007)
Proc. ACM SIGOPS Symp. on Op. Sys. Principles
, pp. 351-366
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
14
-
-
41149108510
-
A virtual instruction set interface for operating system kernels
-
Boston, MA, USA, June
-
J. Criswell, B. Monroe, and V. Adve. A virtual instruction set interface for operating system kernels. In Workshop on the Interaction between Operating Systems and Computer Architecture, pages 26-33, Boston, MA, USA, June 2006.
-
(2006)
Workshop on the Interaction between Operating Systems and Computer Architecture
, pp. 26-33
-
-
Criswell, J.1
Monroe, B.2
Adve, V.3
-
15
-
-
34748826163
-
Language support for fast and reliable message-based communication in Singularity OS
-
M. Fahndrich, M. Aiken, C. Hawblitzel, O. Hodson, G. C. Hunt, J. R. Larus, and S. Levi. Language support for fast and reliable message-based communication in Singularity OS. In Proceedings of EuroSys, 2006.
-
(2006)
Proceedings of EuroSys
-
-
Fahndrich, M.1
Aiken, M.2
Hawblitzel, C.3
Hodson, O.4
Hunt, G.C.5
Larus, J.R.6
Levi, S.7
-
16
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
New York, NY, USA, ACM
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. Inktag: secure applications on an untrusted operating system. In Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, ASPLOS '13, pages 265-278, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13
, pp. 265-278
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
18
-
-
70349103030
-
-
No Starch Press, San Francisco, CA USA
-
J. Kong. Designing BSD Rootkits. No Starch Press, San Francisco, CA, USA, 2007.
-
(2007)
Designing BSD Rootkits
-
-
Kong, J.1
-
19
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis and transformation
-
San Jose, CA, USA, Mar
-
C. Lattner and V. Adve. LLVM: A compilation framework for lifelong program analysis and transformation. In Proc. Conf. on Code Generation and Optimization, pages 75-88, San Jose, CA, USA, Mar 2004.
-
(2004)
Proc. Conf. on Code Generation and Optimization
, pp. 75-88
-
-
Lattner, C.1
Adve, V.2
-
20
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
New York, NY, USA,. ACM
-
D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pages 178-192, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
22
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
Washington, DC, USA,. IEEE Computer Society
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. Trustvisor: Efficient tcb reduction and attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10, pages 143-158, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
23
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
New York, NY, USA, 2008. ACM
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for tcb minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys '08, pages 315-328, New York, NY, USA, 2008. ACM.
-
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys '08
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
24
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
ACM
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, page 10. ACM, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
, pp. 10
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
25
-
-
0003972113
-
-
Addison-Wesley Publishing Company, Inc., Redwood City, CA
-
M. K. McKusick, K. Bostic, M. J. Karels, and J. S. Quarterman. The Design and Implementation of the 4.4 BSD Operating System. Addison-Wesley Publishing Company, Inc., Redwood City, CA, 1996.
-
(1996)
The Design and Implementation of the 4.4 BSD Operating System
-
-
McKusick, M.K.1
Bostic, K.2
Karels, M.J.3
Quarterman, J.S.4
-
26
-
-
85084160699
-
Lmbench: Portable tools for performance analysis
-
Berkeley, CA, USA, 1996. USENIX Association
-
L. McVoy and C. Staelin. lmbench: portable tools for performance analysis. In Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, ATEC ?96, pages 23-23, Berkeley, CA, USA, 1996. USENIX Association.
-
Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference, ATEC ?96
, pp. 23-23
-
-
McVoy, L.1
Staelin, C.2
-
27
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
Washington, DC, USA, 2011. IEEE Computer Society
-
B. Parno, J. R. Lorch, J. R. Douceur, J. Mickens, and J. M. McCune. Memoir: Practical state continuity for protected modules. In Proceedings of the 2011 IEEE Symposium onSecurity and Privacy, SP '11, pages 379-394, Washington, DC, USA, 2011. IEEE Computer Society.
-
Proceedings of the 2011 IEEE Symposium OnSecurity and Privacy, SP '11
, pp. 379-394
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
28
-
-
77954972405
-
Towards application security on untrusted operating systems
-
Berkeley, CA, USA, 2008. USENIX Association
-
D. R. K. Ports and T. Garfinkel. Towards application security on untrusted operating systems. In Proceedings of the 3rd conference on Hot topics in security, HOTSEC'08, pages 1:1-1:7, Berkeley, CA, USA, 2008. USENIX Association.
-
Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08
, pp. 11-17
-
-
Ports, D.R.K.1
Garfinkel, T.2
-
29
-
-
84897792645
-
-
J. Poskanze. http.tiny/turbo/throttling http server, 2000. http://www.acme.com/software/thttpd.
-
(2000)
-
-
Poskanze, J.1
-
30
-
-
84897768398
-
-
Email delivery for web apps, July 2013
-
Postmark. Email delivery for web apps, July 2013.
-
Postmark
-
-
-
31
-
-
84859457954
-
Returnoriented programming: Systems, languages, and applications
-
Mar
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Returnoriented programming: Systems, languages, and applications. ACM Trans. Inf. Syst. Secur., 15(1):2:1-2:34, Mar. 2012.
-
(2012)
ACM Trans. Inf. Syst. Secur.
, vol.15
, Issue.1
, pp. 21-234
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
32
-
-
33745167170
-
-
Windows XP, and Windows 2000 (Pro-Developer). Microsoft Press, Redmond, WA, USA, 2004
-
M. E. Russinovich and D. A. Solomon. MicrosoftWindows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer). Microsoft Press, Redmond, WA, USA, 2004.
-
(2003)
MicrosoftWindows Internals, Fourth Edition: Microsoft Windows Server(TM)
-
-
Russinovich, M.E.1
Solomon, D.A.2
-
34
-
-
40849101774
-
-
Addison-Wesley Professional
-
A. Singh. Mac OS X Internals. Addison-Wesley Professional, 2006.
-
(2006)
Mac OS X Internals
-
-
Singh, A.1
-
36
-
-
84897795871
-
-
The OpenBSD Project. Openssh, 2006. http://www.openssh.com.
-
(2006)
The OpenBSD Project
-
-
-
37
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
New York, NY, USA,. ACM
-
J. Yang and K. G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE '08, pages 71-80, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '08
, pp. 71-80
-
-
Yang, J.1
Shin, K.G.2
-
38
-
-
80755144046
-
Combining control-flow integrity and static analysis for efficient and validated data sandboxing
-
New York, NY, USA,. ACM
-
B. Zeng, G. Tan, and G. Morrisett. Combining control-flow integrity and static analysis for efficient and validated data sandboxing. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 29-40, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 29-40
-
-
Zeng, B.1
Tan, G.2
Morrisett, G.3
|