-
6
-
-
84900405768
-
Softer smartcards - usable cryptographic tokens with secure execution
-
International Financial Cryptography Association (IFCA), Springer
-
F. F. Brasser, S. Bugiel, A. Filyanov, A.-R. Sadeghi, and S. Schulz. Softer smartcards - usable cryptographic tokens with secure execution. In Financial Cryptography. International Financial Cryptography Association (IFCA), Springer, 2012.
-
(2012)
Financial Cryptography
-
-
Brasser, F.F.1
Bugiel, S.2
Filyanov, A.3
Sadeghi, A.-R.4
Schulz, S.5
-
8
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
USENIX
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium. USENIX, 2011.
-
(2011)
USENIX Security Symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
10
-
-
85084161786
-
Killing the myth of Cisco IOS diversity: Recent advances in reliable shellcode design
-
USENIX
-
A. Cui, J. Kataria, and S. J. Stolfo. Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design. In Workshop On Offensive Technologies (WOOT). USENIX, 2011.
-
(2011)
Workshop on Offensive Technologies (WOOT)
-
-
Cui, A.1
Kataria, J.2
Stolfo, S.J.3
-
14
-
-
84889034724
-
PRISM: Human-verifieable code execution
-
J. Franklin, M. Luk, A. Seshadri, and A. Perrig. PRISM: Human-verifieable code execution. Technical report, Carnegie Mellon University, 2007.
-
(2007)
Technical Report, Carnegie Mellon University
-
-
Franklin, J.1
Luk, M.2
Seshadri, A.3
Perrig, A.4
-
18
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
IEEE
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Research in Security and Privacy (S&P). IEEE, 2008.
-
(2008)
Research in Security and Privacy (S&P)
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
19
-
-
33947691568
-
The Nizza secure-system architecture
-
IEEE
-
H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The Nizza secure-system architecture. In Collaborative Computing: Networking, Applications and Worksharing. IEEE, 2005.
-
(2005)
Collaborative Computing: Networking, Applications and Worksharing
-
-
Härtig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
21
-
-
33845213039
-
Are virtual-machine monitors microkernels done right?
-
G. Heiser, V. Uhlig, and J. LeVasseur. Are virtual-machine monitors microkernels done right? SIGOPS Oper. Syst. Rev., 40(1):95-99, 2006.
-
(2006)
SIGOPS Oper. Syst. Rev.
, vol.40
, Issue.1
, pp. 95-99
-
-
Heiser, G.1
Uhlig, V.2
LeVasseur, J.3
-
22
-
-
84900396693
-
-
Infineon Technologies., v1.0
-
Infineon Technologies. XC238xE User's Manual, 2011. v1.0.
-
(2011)
XC238xE User's Manual
-
-
-
24
-
-
85028170979
-
Establishing the genuinity of remote computer systems
-
USENIX
-
R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security Symposium. USENIX, 2003.
-
(2003)
USENIX Security Symposium
-
-
Kennell, R.1
Jamieson, L.H.2
-
25
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
ACM
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an OS kernel. In Symposium on Operating Systems Principles (SOSP). ACM, 2009.
-
(2009)
Symposium on Operating Systems Principles (SOSP)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
27
-
-
0000474763
-
Differential power analysis
-
International Association for Cryptologic Research, Springer
-
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology - CRYPTO '99. International Association for Cryptologic Research, Springer, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
28
-
-
84878354800
-
New results for timing-based attestation
-
IEEE
-
X. Kovah, C. Kallenberg, C. Weathers, A. Herzog, M. Albin, and J. Butterworth. New results for Timing-Based attestation. In Security & Privacy (S&P). IEEE, 2012.
-
(2012)
Security & Privacy (S&P)
-
-
Kovah, X.1
Kallenberg, C.2
Weathers, C.3
Herzog, A.4
Albin, M.5
Butterworth, J.6
-
31
-
-
84872104986
-
Enabling trusted scheduling in embedded systems
-
ACM
-
R. J. Masti, C. Marforio, A. Ranganathan, A. Francillon, and S. Capkun. Enabling trusted scheduling in embedded systems. In ACSAC. ACM, 2012.
-
(2012)
ACSAC
-
-
Masti, R.J.1
Marforio, C.2
Ranganathan, A.3
Francillon, A.4
Capkun, S.5
-
33
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
IEEE Computer Society
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. Trustvisor: Efficient tcb reduction and attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2010.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
34
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
ACM
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In European Conference on Computer Systems (EuroSys). ACM, 2008.
-
(2008)
European Conference on Computer Systems (EuroSys)
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
35
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
ACM
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Hardware and Architectural Support for Security and Privacy (HASP). ACM, 2013.
-
(2013)
Hardware and Architectural Support for Security and Privacy (HASP)
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
37
-
-
33846483949
-
Intel virtualization technology: Hardware support for efficient processor virtualization
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel Virtualization Technology: Hardware support for efficient processor virtualization. Intel Technology Journal, 10(3):167- 177, 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 167-177
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
38
-
-
85076321179
-
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
-
USENIX
-
J. Noorman, P. Agten, W. Daniels, R. Strackx, A. Van Herrewege, C. Huygens, B. Preneel, I. Verbauwhede, and F. Piessens. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In USENIX Security Symposium. USENIX, 2013.
-
(2013)
USENIX Security Symposium
-
-
Noorman, J.1
Agten, P.2
Daniels, W.3
Strackx, R.4
Van Herrewege, A.5
Huygens, C.6
Preneel, B.7
Verbauwhede, I.8
Piessens, F.9
-
40
-
-
0013347999
-
The PERSEUS system architecture
-
B. Pfitzmann, J. Riordan, C. Stüble, M. Waidner, and A. Weber. The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research, 2001.
-
(2001)
Technical Report RZ 3335 (#93381), IBM Research
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
42
-
-
84880296077
-
Extreme scale computing
-
J. Rattner. Extreme scale computing. ISCA Keynote, 2012.
-
(2012)
ISCA Keynote
-
-
Rattner, J.1
-
44
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
USENIX
-
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: privacy trends in consumer ubiquitous computing. In USENIX Security Symposium. USENIX, 2007.
-
(2007)
USENIX Security Symposium
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
49
-
-
38549083620
-
-
Trusted Computing Group (TCG)
-
Trusted Computing Group (TCG). TCG Architecture Overview, 2004.
-
(2004)
TCG Architecture Overview
-
-
-
50
-
-
84910619072
-
Memory errors: The past, the present, and the future
-
Springer
-
V. van der Veen, N. dutt Sharma, L. Cavallaro, and H. Bos. Memory errors: The past, the present, and the future. In Research in Attacks, Intrusions, and Defenses (RAID). Springer, 2012.
-
(2012)
Research in Attacks, Intrusions, and Defenses (RAID)
-
-
Van Der Veen, V.1
Dutt Sharma, N.2
Cavallaro, L.3
Bos, H.4
-
51
-
-
84867570235
-
The state of embedded-device security (spoiler alert: It's bad)
-
IEEE
-
J. Viega and H. Thompson. The state of embedded-device security (spoiler alert: It's bad). Security Privacy, IEEE, 10(5):68-70, 2012.
-
(2012)
Security Privacy
, vol.10
, Issue.5
, pp. 68-70
-
-
Viega, J.1
Thompson, H.2
-
52
-
-
84900455713
-
The SCADA that didn't cry wolf - who's really attacking your ICS devices - part deux!
-
K. Wilhoit. The SCADA that didn't cry wolf - who's really attacking your ICS devices - part deux! Black Hat Briefings, 2013.
-
(2013)
Black Hat Briefings
-
-
Wilhoit, K.1
|