-
1
-
-
84919328815
-
-
November 4
-
McAfee Deep Defender. http://www.mcafee.com/us/resources/data-sheet/ds-deep-defender.pdf, November 4 2013.
-
(2013)
McAfee Deep Defender
-
-
-
4
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
ACM
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security, pages 38-49. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
6
-
-
80755127062
-
Practical and lightweight domain isolation on android
-
ACM
-
S. Bugiel, L. Davi, A. Dmitrienko, S. Heuser, A.-R. Sadeghi, and B. Shastry. Practical and lightweight domain isolation on android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 51-62. ACM, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 51-62
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
Sadeghi, A.-R.5
Shastry, B.6
-
8
-
-
84869391331
-
Return-oriented programming attack on the xen hypervisor
-
IEEE
-
B. Ding, Y. Wu, Y. He, S. Tian, B. Guan, and G. Wu. Return-oriented programming attack on the xen hypervisor. In Availability, Reliability and Security (ARES), 2012 Seventh International Conference on, pages 479-484. IEEE, 2012.
-
(2012)
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
, pp. 479-484
-
-
Ding, B.1
Wu, Y.2
He, Y.3
Tian, S.4
Guan, B.5
Wu, G.6
-
9
-
-
70349242410
-
Scheduling execution of credentials in constrained secure environments
-
ACM
-
J.-E. Ekberg, N. Asokan, K. Kostiainen, and A. Rantala. Scheduling execution of credentials in constrained secure environments. In Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 61-70. ACM, 2008.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 61-70
-
-
Ekberg, J.-E.1
Asokan, N.2
Kostiainen, K.3
Rantala, A.4
-
10
-
-
84855358190
-
Arm trustzone as a virtualization technique in embedded systems
-
Nairobi, Kenya
-
T. Frenzel, A. Lackorzynski, A. Warg, and H. Härtig. Arm trustzone as a virtualization technique in embedded systems. In Proceedings of Twelfth Real-Time Linux Workshop, Nairobi, Kenya, 2010.
-
(2010)
Proceedings of Twelfth Real-Time Linux Workshop
-
-
Frenzel, T.1
Lackorzynski, A.2
Warg, A.3
Härtig, H.4
-
12
-
-
80755127066
-
Delivering secure applications on commercial mobile devices: The case for bare metal hypervisors
-
New York, NY, USA, ACM
-
K. Gudeth, M. Pirretti, K. Hoeper, and R. Buskey. Delivering secure applications on commercial mobile devices: The case for bare metal hypervisors. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11, pages 33-38, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 33-38
-
-
Gudeth, K.1
Pirretti, M.2
Hoeper, K.3
Buskey, R.4
-
13
-
-
84903712355
-
Post-mortem memory analysis of cold-booted android devices
-
SIDAR, Munster, Germany, German Informatics Society
-
C. Hilgers, H. Macht, T. Muller, and M. Spreitzenbarth. Post-mortem memory analysis of cold-booted android devices. In Proceedings of the 8th International Conference on IT Security Incident Management & IT Forensics, SIDAR, Munster, Germany, 2014. German Informatics Society.
-
(2014)
Proceedings of the 8th International Conference on IT Security Incident Management & IT Forensics
-
-
Hilgers, C.1
Macht, H.2
Muller, T.3
Spreitzenbarth, M.4
-
17
-
-
81855220945
-
A universal semantic bridge for virtual machine introspection
-
Springer
-
C. Schneider, J. Pfoh, and C. Eckert. A universal semantic bridge for virtual machine introspection. In Information Systems Security, pages 370-373. Springer, 2011.
-
(2011)
Information Systems Security
, pp. 370-373
-
-
Schneider, C.1
Pfoh, J.2
Eckert, C.3
-
18
-
-
84906744655
-
-
F. Schuster, T. Tendyck, J. Pewny, A. Maaß, M. Steegmanns, M. Contag, and T. Holz. Evaluating the effectiveness of current anti-rop defenses. 2014.
-
(2014)
Evaluating the Effectiveness of Current Anti-rop Defenses
-
-
Schuster, F.1
Tendyck, T.2
Pewny, J.3
Maaß, A.4
Steegmanns, M.5
Contag, M.6
Holz, T.7
-
19
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
Berkeley, CA, USA, USENIX Association
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau. The flask security architecture: System support for diverse security policies. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM'99, pages 11-11, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
Proceedings of the 8th Conference on USENIX Security Symposium, SSYM'99
, vol.8
, pp. 11-11
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
21
-
-
77954726625
-
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
-
Springer
-
A. Vasudevan, J. M. McCune, N. Qu, L. Van Doorn, and A. Perrig. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture. In Trust and Trustworthy Computing, pages 141-165. Springer, 2010.
-
(2010)
Trust and Trustworthy Computing
, pp. 141-165
-
-
Vasudevan, A.1
McCune, J.M.2
Qu, N.3
Van Doorn, L.4
Perrig, A.5
-
24
-
-
70349253246
-
Trusted computing building blocks for embedded linux-based arm trustzone platforms
-
ACM
-
J. Winter. Trusted computing building blocks for embedded linux-based arm trustzone platforms. In Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 21-30. ACM, 2008.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 21-30
-
-
Winter, J.1
-
28
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Security Symposium, 2012.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Yan, L.K.1
Yin, H.2
|