메뉴 건너뛰기




Volumn , Issue , 2014, Pages 308-323

Dancing with giants: Wimpy kernels for on-demand isolated I/O

Author keywords

[No Author keywords available]

Indexed keywords

COMMODITY OPERATING SYSTEMS; COMMODITY SYSTEMS; KERNEL ARCHITECTURE; KERNEL SIZE; PERFORMANCE MEASUREMENTS; SECURITY ARCHITECTURE; SENSITIVE APPLICATION; TRUSTED COMPUTING BASE;

EID: 84914102853     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.27     Document Type: Conference Paper
Times cited : (49)

References (70)
  • 2
  • 3
    • 84914168468 scopus 로고    scopus 로고
    • [Accessed on 9 Nov]
    • SeaBIOS. http://www.coreboot.org/SeaBIOS [Accessed on 9 Nov 2013].
    • (2013) SeaBIOS
  • 8
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Air Force Electronic Systems Division
    • J. P. Anderson. Computer security technology planning study. volume 2. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, 1972.
    • (1972) Technical Report ESD-TR-73-51 , vol.2
    • Anderson, J.P.1
  • 10
    • 84878356074 scopus 로고    scopus 로고
    • Version 1.11 for XTS-400, Version 6
    • BAE Systems Information Technology LLC. Security Target, Version 1.11 for XTS-400, Version 6, 2004.
    • (2004) Security Target
  • 13
    • 58049139900 scopus 로고    scopus 로고
    • Tamper-resistant execution in an untrusted operating system using a virtual machine monitor
    • Parallel Processing Institute, Fudan University
    • H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, and W. Mao. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. Technical Report FDUPPITR-2007-0801, Parallel Processing Institute, Fudan University, 2007.
    • (2007) Technical Report FDUPPITR-2007-0801
    • Chen, H.1    Zhang, F.2    Chen, C.3    Yang, Z.4    Chen, R.5    Zang, B.6    Mao, W.7
  • 16
    • 84906502672 scopus 로고    scopus 로고
    • Appshield: Protecting applications against untrusted operating system
    • Singapore Management University
    • Y. Cheng, X. Ding, and R. Deng. Appshield: Protecting applications against untrusted operating system. Technical Report SMU-SIS-13-101, Singapore Management University, 2013.
    • (2013) Technical Report SMU-SIS-13-101
    • Cheng, Y.1    Ding, X.2    Deng, R.3
  • 24
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Proc. of CRYPTO, 2010.
    • (2010) Proc. of CRYPTO
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 28
    • 84914168459 scopus 로고    scopus 로고
    • [Accessed on 7 Nov 2013]
    • I. Green Hills Software. Integrity-178b separation kernel security target. http://www.niap-ccevs.org/st/st vid10362-st.pdf [Accessed on 7 Nov 2013], 2010.
    • (2010) Integrity-178b Separation Kernel Security Target
  • 45
    • 84914163660 scopus 로고    scopus 로고
    • Lessons from VAX/SVS for high assurance VM systems
    • S. Lipner, T. Jaeger, and M. E. Zurko. Lessons from VAX/SVS for high assurance VM systems. IEEE Security and Privacy, 10(6):26-35, 2012.
    • (2012) IEEE Security and Privacy , vol.10 , Issue.6 , pp. 26-35
    • Lipner, S.1    Jaeger, T.2    Zurko, M.E.3
  • 64
    • 84914168439 scopus 로고    scopus 로고
    • [Accessed on 7 Nov 2013]
    • W. R. Systems. Wind river vxworks mils platform. http://www.windriver.com/products/platforms/vxworks-mils/MILS-3 PO.pdf [Accessed on 7 Nov 2013], 2013.
    • (2013) Wind River Vxworks Mils Platform


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.