-
1
-
-
85192414507
-
-
ARM TrustZone, accessed April
-
ARM, TrustZone. http://www.arm.com/products/processors/technologies/trustzone.php, accessed April 2013.
-
(2013)
-
-
-
2
-
-
85192418224
-
-
VMWare., accessed April
-
VMWare. http://www.vmware.com/, accessed April 2013.
-
(2013)
-
-
-
3
-
-
85192397683
-
-
Xen, accessed May
-
Xen. http://www.xen.org, accessed May 2013.
-
(2013)
-
-
-
7
-
-
0035474388
-
Building the ibm 4758 secure coprocessor
-
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, and Steve Weingart. Building the IBM 4758 Secure Coprocessor. Computer, 34:57-66, 2001.
-
(2001)
Computer
, vol.34
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
8
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. SIGOPS Oper. Syst. Rev., 37(5):193-206, 2003.
-
(2003)
SIGOPS Oper. Syst. Rev
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
Ruby B. Lee, Peter Kwan, John Patrick McGregor, Jeffrey Dwoskin, and Zhenghong Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the International Symposium on Computer Architecture, ISCA, pages 2-13, 2005.
-
(2005)
Proceedings of the International Symposium on Computer Architecture, ISCA
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
12
-
-
4444322842
-
Specifying and verifying hardware for tamper-resistant software
-
David Lie, John C.Mitchell, Chandramohan A. Thekkath, and Mark Horowitz. Specifying and verifying hardware for tamper-resistant software. In Proceedings of Symposium on Security and Privacy, S&P, pages 166-177, 2003.
-
(2003)
Proceedings of Symposium on Security and Privacy, S&P
, pp. 166-177
-
-
Lie, D.1
Mitchell, J.C.2
Thekkath, C.A.3
Horowitz, M.4
-
13
-
-
56549083677
-
Guest-Transparent prevention of kernel rootkits with vmm-based memory shadowing
-
In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, of Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-Transparent prevention of kernel rootkits with vmm-based memory shadowing. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, volume 5230 of Lecture Notes in Computer Science, pages 1-20. Springer Berlin Heidelberg, 2008.
-
(2008)
Recent Advances in Intrusion Detection
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
14
-
-
51949119355
-
-
Technical Report RC23511, IBM Research
-
Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Van Doorn, John Linwood Griffin, Stefan Berger, Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Doorn, John Linwood, and Griffin Stefan Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, 2005.
-
(2005)
SHype: Secure Hypervisor Approach to Trusted Virtualized Systems
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Van Doorn, L.5
Griffin, J.L.6
Berger, S.7
Sailer, R.8
Valdez, E.9
Jaeger, T.10
Perez, R.11
Doorn, L.12
Linwood, J.13
Berger, G.S.14
-
15
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SIGOPS Oper. Syst. Rev., 41(6):335-350, 2007.
-
(2007)
SIGOPS Oper. Syst. Rev
, vol.41
, Issue.6
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
16
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
Monirul I. Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 477-487, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
17
-
-
77954565496
-
Nova: A microhypervisor-based secure virtualization architecture
-
Udo Steinberg and Bernhard Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In European Conference on Computer Systems, pages 209-222, 2010.
-
(2010)
European Conference on Computer Systems
, pp. 209-222
-
-
Steinberg, U.1
Kauer, B.2
-
18
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th annual International Conference on Supercomputing, ICS '03, pages 160-171, 2003.
-
(2003)
Proceedings of the 17th annual International Conference on Supercomputing, ICS '03
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
27
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS, pages 545-554, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|