-
2
-
-
84914168470
-
-
[Accessed on 21 Feb]
-
GNU Pth - The GNU Portable Threads. http://www.gnu.org/software/pth/ [Accessed on 21 Feb 2014].
-
(2014)
GNU Pth - The GNU Portable Threads
-
-
-
3
-
-
84914168468
-
-
[Accessed on 9 Nov]
-
SeaBIOS. http://www.coreboot.org/SeaBIOS [Accessed on 9 Nov 2013].
-
(2013)
SeaBIOS
-
-
-
8
-
-
0004200684
-
Computer security technology planning study
-
Air Force Electronic Systems Division
-
J. P. Anderson. Computer security technology planning study. volume 2. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, 1972.
-
(1972)
Technical Report ESD-TR-73-51
, vol.2
-
-
Anderson, J.P.1
-
10
-
-
84878356074
-
-
Version 1.11 for XTS-400, Version 6
-
BAE Systems Information Technology LLC. Security Target, Version 1.11 for XTS-400, Version 6, 2004.
-
(2004)
Security Target
-
-
-
11
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proc. ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
13
-
-
58049139900
-
Tamper-resistant execution in an untrusted operating system using a virtual machine monitor
-
Parallel Processing Institute, Fudan University
-
H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, and W. Mao. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. Technical Report FDUPPITR-2007-0801, Parallel Processing Institute, Fudan University, 2007.
-
(2007)
Technical Report FDUPPITR-2007-0801
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Yang, Z.4
Chen, R.5
Zang, B.6
Mao, W.7
-
14
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proc. Architectural Support for Programming Languages and Operating Systems, 2008.
-
(2008)
Proc. Architectural Support for Programming Languages and Operating Systems
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
16
-
-
84906502672
-
Appshield: Protecting applications against untrusted operating system
-
Singapore Management University
-
Y. Cheng, X. Ding, and R. Deng. Appshield: Protecting applications against untrusted operating system. Technical Report SMU-SIS-13-101, Singapore Management University, 2013.
-
(2013)
Technical Report SMU-SIS-13-101
-
-
Cheng, Y.1
Ding, X.2
Deng, R.3
-
17
-
-
84885012508
-
Driver guard: Virtualization-based fine-grained protection on i/o flows
-
Y. Cheng, X. Ding, and R. H. Deng. Driver Guard: Virtualization-based fine-grained protection on i/o flows. ACM Transaction on Information and System Security, 16(2):1-30, 2013.
-
(2013)
ACM Transaction on Information and System Security
, vol.16
, Issue.2
, pp. 1-30
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
18
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
P. Colp, M. Nanavati, J. Zhu, W. Aiello, G. Coker, T. Deegan, P. Loscocco, and A. Warfield. Breaking up is hard to do: Security and functionality in a commodity hypervisor. In Proc. ACM Symposium on Operating Systems Principles, 2011.
-
(2011)
Proc. ACM Symposium on Operating Systems Principles
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
22
-
-
35948950577
-
Safe hardware access with the xen virtual machine monitor
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe hardware access with the xen virtual machine monitor. In Proc. Workshop on Operating System and Architectural Support for the on demand IT Infra Structure (OASIS), 2004.
-
(2004)
Proc. Workshop on Operating System and Architectural Support for the on Demand IT Infra Structure (OASIS)
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
23
-
-
77957808684
-
The design and implementation of microdrivers
-
V. Ganapathy, M. J. Renzelmann, A. Balakrishnan, M. M. Swift, and S. Jha. The design and implementation of microdrivers. In Proc. International Conference on Architectural Support for Programming Languages and Operating Systems, 2008.
-
(2008)
Proc. International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
24
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Proc. of CRYPTO, 2010.
-
(2010)
Proc. of CRYPTO
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
28
-
-
84914168459
-
-
[Accessed on 7 Nov 2013]
-
I. Green Hills Software. Integrity-178b separation kernel security target. http://www.niap-ccevs.org/st/st vid10362-st.pdf [Accessed on 7 Nov 2013], 2010.
-
(2010)
Integrity-178b Separation Kernel Security Target
-
-
-
30
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In Proc. International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
-
(2013)
Proc. International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
31
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. Inktag: secure applications on an untrusted operating system. In Proc. international conference on Architectural support for programming languages and operating systems, 2013.
-
(2013)
Proc. International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
37
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, SE-17(11):1147-1165, 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.SE-17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
39
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In Proc. ACM Symposium on Operating Systems Principles, 2009.
-
(2009)
Proc. ACM Symposium on Operating Systems Principles
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
42
-
-
33644593158
-
User-level device drivers: Achieved performance
-
B. Leslie, P. Chubb, N. Fitzroy-dale, S. Gotz, C. Gray, L. Macpherson, D. Potts, Y. Shen, K. Elphinstone, and G. Heiser. User-level device drivers: Achieved performance. Journal of Computer Science and Technology, 20(5):654-664, 2005.
-
(2005)
Journal of Computer Science and Technology
, vol.20
, Issue.5
, pp. 654-664
-
-
Leslie, B.1
Chubb, P.2
Fitzroy-Dale, N.3
Gotz, S.4
Gray, C.5
MacPherson, L.6
Potts, D.7
Shen, Y.8
Elphinstone, K.9
Heiser, G.10
-
44
-
-
84940997196
-
Minibox: A two-way sandbox for x86 native code
-
Carnegie Mellon University
-
Y. Li, A. Perrig, J. McCune, J. Newsome, B. Baker, and W. Drewry. Minibox: A two-way sandbox for x86 native code. Technical Report CMU-CyLab-14-001, Carnegie Mellon University, 2014.
-
(2014)
Technical Report CMU-CyLab-14-001
-
-
Li, Y.1
Perrig, A.2
McCune, J.3
Newsome, J.4
Baker, B.5
Drewry, W.6
-
45
-
-
84914163660
-
Lessons from VAX/SVS for high assurance VM systems
-
S. Lipner, T. Jaeger, and M. E. Zurko. Lessons from VAX/SVS for high assurance VM systems. IEEE Security and Privacy, 10(6):26-35, 2012.
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.6
, pp. 26-35
-
-
Lipner, S.1
Jaeger, T.2
Zurko, M.E.3
-
47
-
-
77955186544
-
Trust visor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. Trust Visor: Efficient TCB reduction and attestation. In Proc. IEEE Symposium on Security and Privacy, 2010.
-
(2010)
Proc. IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
48
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In Proc. European Conference in Computer Systems, 2008.
-
(2008)
Proc. European Conference in Computer Systems
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
50
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proc. International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
-
(2013)
Proc. International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
52
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
B. Parno, J. R. Lorch, J. R. Douceur, J. Mickens, and J. M. McCune. Memoir: Practical state continuity for protected modules. In Proc. IEEE Symposium on Security and Privacy, 2011.
-
(2011)
Proc. IEEE Symposium on Security and Privacy
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
54
-
-
79953113063
-
Rethinking the library os from the top down
-
D. E. Porter, S. Boyd-Wickizer, J. Howell, R. Olinsky, and G. C. Hunt. Rethinking the library os from the top down. In Proc. International Conference on Architectural Support for Programming Languages and Operating Systems, 2011.
-
(2011)
Proc. International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Porter, D.E.1
Boyd-Wickizer, S.2
Howell, J.3
Olinsky, R.4
Hunt, G.C.5
-
60
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing I/O device security
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. Bitvisor: a thin hypervisor for enforcing I/O device security. In Proc. ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2009.
-
(2009)
Proc. ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
64
-
-
84914168439
-
-
[Accessed on 7 Nov 2013]
-
W. R. Systems. Wind river vxworks mils platform. http://www.windriver.com/products/platforms/vxworks-mils/MILS-3 PO.pdf [Accessed on 7 Nov 2013], 2013.
-
(2013)
Wind River Vxworks Mils Platform
-
-
-
66
-
-
84881219022
-
Design, implementation and verification of an extensible and modular hypervisor framework
-
A. Vasudevan, S. Chaki, L. Jia, J. McCune, J. Newsome, and A. Datta. Design, implementation and verification of an extensible and modular hypervisor framework. In Proc. IEEE Symposium on Security and Privacy, 2013.
-
(2013)
Proc. IEEE Symposium on Security and Privacy
-
-
Vasudevan, A.1
Chaki, S.2
Jia, L.3
McCune, J.4
Newsome, J.5
Datta, A.6
-
67
-
-
49249126891
-
The zurich trusted information channel - An efficient defence against man-in-the-middle and malicious software attacks
-
T. Weigold, T. Kramp, R. Hermann, F. Höring, P. Buhler, and M. Baentsch. The zurich trusted information channel - an efficient defence against man-in-the-middle and malicious software attacks. In Proc. International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications, 2008.
-
(2008)
Proc. International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
Höring, F.4
Buhler, P.5
Baentsch, M.6
-
68
-
-
85076907815
-
Device driver safety through a reference validation mechanism
-
D. Williams, P. Reynolds, K. Walsh, E. G. Sirer, and F. B. Schneider. Device driver safety through a reference validation mechanism. In Proc. USENIX Conference on Operating Systems Design and Implementation, 2008.
-
(2008)
Proc. USENIX Conference on Operating Systems Design and Implementation
-
-
Williams, D.1
Reynolds, P.2
Walsh, K.3
Sirer, E.G.4
Schneider, F.B.5
-
70
-
-
84884658327
-
Kiss: Key it simple and secure corporate key management
-
Z. Zhou, J. Han, Y.-H. Lin, A. Perrig, and V. Gligor. Kiss: Key it simple and secure corporate key management. In Proc. International Conference on Trust and Trustworthy Computing, 2013.
-
(2013)
Proc. International Conference on Trust and Trustworthy Computing
-
-
Zhou, Z.1
Han, J.2
Lin, Y.-H.3
Perrig, A.4
Gligor, V.5
|