-
1
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA. ACM
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177, New York, NY, USA, 2003. ACM.
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
84875649201
-
Iago attacks: Why the system call api is a bad untrusted rpc interface
-
New York, NY, USA, ACM
-
Stephen Checkoway and Hovav Shacham. Iago attacks: why the system call api is a bad untrusted rpc interface. In Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, ASPLOS '13, pages 253-264, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13
, pp. 253-264
-
-
Checkoway, S.1
Shacham, H.2
-
5
-
-
58049139900
-
Tamper-resistant execution in an untrusted operating system using a virtual machine monitor
-
Parallel Processing Institute, Fudan University, August
-
H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, P.C. Yew, and W. Mao. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. Technical Report FDUPPITR-2007-0801, Parallel Processing Institute, Fudan University, August 2007.
-
(2007)
Technical Report FDUPPITR-2007-0801
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Yang, Z.4
Chen, R.5
Zang, B.6
Yew, P.C.7
Mao, W.8
-
6
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
New York, NY, USA, ACM
-
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R.K. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, ASPLOS XIII, pages 2-13, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Christopher Lewis, E.3
Subrahmanyam, P.4
Carl, A.5
Dan Boneh, W.6
Dwoskin, J.7
Ports, D.R.K.8
-
7
-
-
84884655952
-
Guardian: Hypervisor as security foothold for personal computers
-
Springer Berlin Heidelberg
-
Yueqiang Cheng and Xuhua Ding. Guardian: Hypervisor as security foothold for personal computers. In Trust and Trustworthy Computing, pages 19-36. Springer Berlin Heidelberg, 2013.
-
(2013)
Trust and Trustworthy Computing
, pp. 19-36
-
-
Cheng, Y.1
Ding, X.2
-
8
-
-
80052985363
-
Driverguard: A fine-grained protection on I/O flows
-
Berlin, Heidelberg. Springer-Verlag
-
Yueqiang Cheng, Xuhua Ding, and Robert H. Deng. Driverguard: a fine-grained protection on I/O flows. In Proceedings of the 16th European conference on Research in computer security, ESORICS'11, pages 227-244, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 16th European Conference on Research in Computer Security, ESORICS'11
, pp. 227-244
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
9
-
-
79959617325
-
Secureme: A hardware-software approach to full system security
-
New York, NY, USA, ACM
-
Siddhartha Chhabra, Brian Rogers, Yan Solihin, and Milos Prvulovic. Secureme: a hardware-software approach to full system security. In Proceedings of the international conference on Supercomputing, ICS '11, pages 108-119, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the International Conference on Supercomputing, ICS '11
, pp. 108-119
-
-
Chhabra, S.1
Rogers, B.2
Solihin, Y.3
Prvulovic, M.4
-
12
-
-
84897782769
-
Virtual ghost: Protecting applications from hostile operating systems
-
ACM
-
John Criswell, Nathan Dautenhahn, and Vikram Adve. Virtual ghost: Protecting applications from hostile operating systems. ASPLOS '14, pages 81-96. ACM, 2014.
-
(2014)
ASPLOS '14
, pp. 81-96
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
13
-
-
0042349623
-
A trusted open platform
-
July
-
Paul England, Butler Lampson, John Manferdelli, Marcus Peinado, and Bryan Willman. A trusted open platform. Computer, 36(7):55-62, July 2003.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
14
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
New York, NY, USA. ACM
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the 9th ACM Symposium on Operating Systems Principles, pages 193-206, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 9th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
15
-
-
84858769357
-
Eli: Bare-metal performance for i/o virtualization
-
New York, NY, USA, ACM
-
Abel Gordon, Nadav Amit, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, and Dan Tsafrir. Eli: bare-metal performance for i/o virtualization. In Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XVII, pages 411-422, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XVII
, pp. 411-422
-
-
Gordon, A.1
Amit, N.2
Har'El, N.3
Ben-Yehuda, M.4
Landau, A.5
Schuster, A.6
Tsafrir, D.7
-
16
-
-
33947691568
-
The nizza secure-system architecture
-
IEEE
-
H. Hartig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The nizza secure-system architecture. In Collaborative Computing: Networking, Applications and Worksharing, 2005 International Conference on, pages 10-pp. IEEE, 2005.
-
(2005)
Collaborative Computing: Networking, Applications and Worksharing, 2005 International Conference on
, pp. 10
-
-
Hartig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
17
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
New York, NY, USA, ACM
-
Owen S. Hofmann, Sangman Kim, Alan M. Dunn, Michael Z. Lee, and Emmett Witchel. Inktag: secure applications on an untrusted operating system. In Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, ASPLOS '13, pages 265-278, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13
, pp. 265-278
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
18
-
-
84942533572
-
-
Intel. Intel Trusted Execution Technology (Intel TXT) software development guide. Dec 2009.
-
Intel. Intel Trusted Execution Technology (Intel TXT) software development guide. Dec 2009.
-
-
-
-
19
-
-
84942533573
-
-
Intel. Intel 64 and IA-32 architectures software developer's manual combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c. October 2011.
-
Intel. Intel 64 and IA-32 architectures software developer's manual combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c. October 2011.
-
-
-
-
20
-
-
84942511933
-
-
Yanlin Li, Adrian Perrig, Jonathan M McCune, James Newsome, Brandon Baker, and Will Drewry. Minibox: A two-way sandbox for x86 native code (cmu-cylab-14-001). 2014.
-
(2014)
Minibox: A Two-way Sandbox for x86 Native Code (cmu-cylab-14-001)
-
-
Li, Y.1
Perrig, A.2
McCune, J.M.3
Newsome, J.4
Baker, B.5
Drewry, W.6
-
21
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
New York, NY, USA. ACM
-
David Lie, Chandramohan A. Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pages 178-192, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
22
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
Washington, DC, USA. IEEE Computer Society
-
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. Trustvisor: Efficient tcb reduction and attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10, pages 143-158, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
23
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
New York, NY, USA. ACM
-
Jonathan M. McCune, Bryan J. Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. Flicker: an execution infrastructure for tcb minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys '08, pages 315-328, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys '08
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
24
-
-
0013347999
-
The perseus system architecture
-
B. Pfitzmann, J. Riordan, C. Stüble, M. Waidner, and A. Weber. The perseus system architecture. In VIS, pages 1-18, 2001.
-
(2001)
VIS
, pp. 1-18
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
27
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
New York, NY, USA. ACM
-
Monirul I. Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 477-487, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
28
-
-
84869412964
-
Fides: Selectively hardening software application components against kernel-level or process-level malware
-
New York, NY, USA. ACM
-
Raoul Strackx and Frank Piessens. Fides: selectively hardening software application components against kernel-level or process-level malware. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 2-13, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 2-13
-
-
Strackx, R.1
Piessens, F.2
-
29
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
New York, NY, USA, ACM
-
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. Aegis: architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th annual international conference on Supercomputing, ICS '03, pages 160-171, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03
, pp. 160-171
-
-
Edward Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
31
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
Berkeley, CA, USA. USENIX Association
-
Richard Ta-Min, Lionel Litty, and David Lie. Splitting interfaces: making trust between applications and operating systems configurable. In Proceedings of the 7th symposium on Operating systems design and implementation, OSDI '06, pages 279-292, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06
, pp. 279-292
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
33
-
-
84863111808
-
Lockdown: Towards a safe and practical architecture for security applications on commodity platforms
-
Berlin, Heidelberg. Springer-Verlag
-
Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, and Adrian Perrig. Lockdown: towards a safe and practical architecture for security applications on commodity platforms. In Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, pages 34-54, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST'12
, pp. 34-54
-
-
Vasudevan, A.1
Parno, B.2
Qu, N.3
Gligor, V.D.4
Perrig, A.5
-
34
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
New York, NY, USA. ACM
-
Jisoo Yang and Kang G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE '08, pages 71-80, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '08
, pp. 71-80
-
-
Yang, J.1
Shin, K.G.2
|