메뉴 건너뛰기




Volumn , Issue , 2015, Pages 345-356

Efficient virtualization-based application protection against untrusted operating system

Author keywords

Address Space Isolation; Application Protection; Isolated Execution Environment; Untrusted OS

Indexed keywords

COMPUTER OPERATING SYSTEMS;

EID: 84942511833     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2714576.2714618     Document Type: Conference Paper
Times cited : (17)

References (35)
  • 5
    • 58049139900 scopus 로고    scopus 로고
    • Tamper-resistant execution in an untrusted operating system using a virtual machine monitor
    • Parallel Processing Institute, Fudan University, August
    • H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, P.C. Yew, and W. Mao. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. Technical Report FDUPPITR-2007-0801, Parallel Processing Institute, Fudan University, August 2007.
    • (2007) Technical Report FDUPPITR-2007-0801
    • Chen, H.1    Zhang, F.2    Chen, C.3    Yang, Z.4    Chen, R.5    Zang, B.6    Yew, P.C.7    Mao, W.8
  • 7
    • 84884655952 scopus 로고    scopus 로고
    • Guardian: Hypervisor as security foothold for personal computers
    • Springer Berlin Heidelberg
    • Yueqiang Cheng and Xuhua Ding. Guardian: Hypervisor as security foothold for personal computers. In Trust and Trustworthy Computing, pages 19-36. Springer Berlin Heidelberg, 2013.
    • (2013) Trust and Trustworthy Computing , pp. 19-36
    • Cheng, Y.1    Ding, X.2
  • 12
    • 84897782769 scopus 로고    scopus 로고
    • Virtual ghost: Protecting applications from hostile operating systems
    • ACM
    • John Criswell, Nathan Dautenhahn, and Vikram Adve. Virtual ghost: Protecting applications from hostile operating systems. ASPLOS '14, pages 81-96. ACM, 2014.
    • (2014) ASPLOS '14 , pp. 81-96
    • Criswell, J.1    Dautenhahn, N.2    Adve, V.3
  • 18
    • 84942533572 scopus 로고    scopus 로고
    • Intel. Intel Trusted Execution Technology (Intel TXT) software development guide. Dec 2009.
    • Intel. Intel Trusted Execution Technology (Intel TXT) software development guide. Dec 2009.
  • 19
    • 84942533573 scopus 로고    scopus 로고
    • Intel. Intel 64 and IA-32 architectures software developer's manual combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c. October 2011.
    • Intel. Intel 64 and IA-32 architectures software developer's manual combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c. October 2011.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.