-
2
-
-
84891783006
-
Starlight: Interactive link
-
M. Anderson, C. North, J. Griffin, R. Milner, J. Yesberg, and K. Yiu. Starlight: Interactive Link. In Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC), 1996.
-
(1996)
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC)
-
-
Anderson, M.1
North, C.2
Griffin, J.3
Milner, R.4
Yesberg, J.5
Yiu, K.6
-
3
-
-
2342466750
-
Hack-a-vote: Demonstrating security issues with electronic voting systems
-
Jan./Feb
-
J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach. Hack-a-vote: Demonstrating security issues with electronic voting systems. IEEE Security and Privacy Magazine, 2(1):32–37, Jan./Feb. 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.1
, pp. 32-37
-
-
Bannet, J.1
Price, D.W.2
Rudys, A.3
Singer, J.4
Wallach, D.S.5
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
October
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Sstems Principles (SOSP 2003), October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Sstems Principles (SOSP 2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
19044375174
-
An overview of JML tools and applications
-
June
-
L. Burdy, Y. Cheon, D. Cok, M. Ernst, J. Kiniry, G. Leavens, K. R. Leino, and E. Poll. An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer (STTT), 7(3):212–232, June 2005.
-
(2005)
International Journal on Software Tools for Technology Transfer (STTT)
, vol.7
, Issue.3
, pp. 212-232
-
-
Burdy, L.1
Cheon, Y.2
Cok, D.3
Ernst, M.4
Kiniry, J.5
Leavens, G.6
Leino, K.R.7
Poll, E.8
-
9
-
-
80053199674
-
Microreboot – A technique for cheap recovery
-
December
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot – a technique for cheap recovery. In 6th Symposium on Operating System Design and Implementation (OSDI), December 2004.
-
(2004)
6th Symposium on Operating System Design and Implementation (OSDI)
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
10
-
-
2342617507
-
Secret-ballot receipts: True voter-verifiable elections
-
Jan.–Feb
-
D. Chaum. Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy Magazine, 2(1):38–47, Jan.–Feb. 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.1
, pp. 38-47
-
-
Chaum, D.1
-
14
-
-
33847778695
-
Secure embedded systems need microkernels
-
December
-
G. Heiser. Secure embedded systems need microkernels. USENIX;login, 30(6):9–13, December 2005.
-
(2005)
USENIX;Login
, vol.30
, Issue.6
, pp. 9-13
-
-
Heiser, G.1
-
15
-
-
0028994247
-
Software rejuvenation: Analysis, module and applications
-
Y. Huang, C. Kintala, N. Kolettis, and N. D. Fulton. Software rejuvenation: Analysis, module and applications. In Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995.
-
(1995)
Twenty-Fifth International Symposium on Fault-Tolerant Computing
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
Fulton, N.D.4
-
17
-
-
3543102147
-
Analysis of an electronic voting system
-
May
-
T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy, pages 27–40, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 27-40
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.D.3
Wallach, D.S.4
-
18
-
-
84862923478
-
Optical time-domain eavesdropping risks of CRT displays
-
May
-
M. Kuhn. Optical time-domain eavesdropping risks of CRT displays. In IEEE Symposium on Security and Privacy, May 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Kuhn, M.1
-
20
-
-
0030243542
-
Toward real microkernels
-
September
-
J. Liedtke. Toward real microkernels. Communications of the ACM, 39(9):70, September 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 70
-
-
Liedtke, J.1
-
21
-
-
0023829319
-
Noninterference and the composability of security properties
-
May
-
D. McCullough. Noninterference and the composability of security properties. In IEEE Symposium on Security and Privacy, May 1988.
-
(1988)
IEEE Symposium on Security and Privacy
-
-
McCullough, D.1
-
22
-
-
0038789727
-
-
PhD thesis, School of Engineering and Applied Science of the University of Pennsylvania
-
R. Mercuri. Electronic Vote Tabulation Checks & Balances. PhD thesis, School of Engineering and Applied Science of the University of Pennsylvania, 2000.
-
(2000)
Electronic Vote Tabulation Checks & Balances
-
-
Mercuri, R.1
-
23
-
-
0036824048
-
A better ballot box?
-
October
-
R. Mercuri. A better ballot box? IEEE Spectrum, 39(10):46–50, October 2002.
-
(2002)
IEEE Spectrum
, vol.39
, Issue.10
, pp. 46-50
-
-
Mercuri, R.1
-
25
-
-
33751038992
-
Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine (extended abstract)
-
May
-
D. Molnar, T. Kohno, N. Sastry, and D. Wagner. Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine (extended abstract). In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Molnar, D.1
Kohno, T.2
Sastry, N.3
Wagner, D.4
-
30
-
-
85077723571
-
-
Technical Report TR05-03, University of Arizona, February
-
M. Rajagopalan, S. Debray, M. Hiltunen, and R. Schlichting. Automated operating system specialization via binary rewriting. Technical Report TR05-03, University of Arizona, February 2005.
-
(2005)
Automated Operating System Specialization Via Binary Rewriting
-
-
Rajagopalan, M.1
Debray, S.2
Hiltunen, M.3
Schlichting, R.4
-
31
-
-
0023596882
-
Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures
-
October
-
R. Rashid Jr., A. Tevanian, M. Young, M. Young, D. Golub, R. Baron, D. Black, W. Bolosky, and J. Chew. Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures. In Proceedings of the 2nd Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS), October 1987.
-
(1987)
Proceedings of the 2nd Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Rashid, R.1
Tevanian, A.2
Young, M.3
Young, M.4
Golub, D.5
Baron, R.6
Black, D.7
Bolosky, W.8
Chew, J.9
-
37
-
-
0022218742
-
Electromagnetic radiation from video display units: An eavesdropping risk?
-
W. van Eck. Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security, 4, 1985.
-
(1985)
Computers & Security
, vol.4
-
-
van Eck, W.1
-
38
-
-
77954394047
-
Security analysis of the diebold AccuBasic interpreter
-
February
-
D. Wagner, D. Jefferson, M. Bishop, C. Karlof, and N. Sastry. Security analysis of the Diebold AccuBasic interpreter. California Secretary of State’s Voting Systems Technology Assessment Advisory Board (VSTAAB), February 2006.
-
(2006)
California Secretary of State’s Voting Systems Technology Assessment Advisory Board (VSTAAB)
-
-
Wagner, D.1
Jefferson, D.2
Bishop, M.3
Karlof, C.4
Sastry, N.5
-
41
-
-
0032047998
-
Key applications for high-assurance systems
-
April
-
I.-L. Yen and R. Paul. Key applications for high-assurance systems. IEEE Computer, 31(4):35–45, April 1998.
-
(1998)
IEEE Computer
, vol.31
, Issue.4
, pp. 35-45
-
-
Yen, I.-L.1
Paul, R.2
|