-
1
-
-
33646767376
-
Control-flow integrity: Principles implementations and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In ACM Conference on Computer and Communications Security (CCS), 2005.
-
(2005)
ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
84945176267
-
-
Apache Software Foundation Accessed: 11/05/
-
Apache Software Foundation. Hadoop. http://wiki.apache.org/hadoop/, Accessed: 11/05/2014.
-
(2014)
Hadoop
-
-
-
5
-
-
84945211816
-
-
Apache Software Foundation Accessed: 11/05/2014
-
Apache Software Foundation. HadoopStreaming. http://hadoop.apache. org/docs/r1.2.1/streaming.html, Accessed: 11/05/2014.
-
HadoopStreaming
-
-
-
6
-
-
85084014165
-
Orthogonal security with Cipherbase
-
A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Rama-murthy, and R. Venkatesan. Orthogonal security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR), 2013.
-
(2013)
Conference on Innovative Data Systems Research (CIDR)
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
Kaushik, R.4
Kossmann, D.5
Rama-Murthy, R.6
Venkatesan, R.7
-
7
-
-
84928152994
-
TrustedDB: A trusted hardware-based database with privacy and data confidentiality
-
S. Bajaj and R. Sion. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. In IEEE Transactions on Knowledge and Data Engineering, volume 26, 2014.
-
(2014)
IEEE Transactions on Knowledge and Data Engineering
, vol.26
-
-
Bajaj, S.1
Sion, R.2
-
8
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neuge-bauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neuge-Bauer, R.7
Pratt, I.8
Warfield, A.9
-
11
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology-ASIACRYPT, 2000.
-
(2000)
Advances in Cryptology-ASIACRYPT
-
-
Bellare, M.1
Namprempre, C.2
-
12
-
-
84864269507
-
Prism-privacy-preserving search in MapReduce
-
S. Fischer-Hübner and M. Wright, editors Springer Berlin Heidelberg
-
E.-O. Blass, R. Di Pietro, R. Molva, and M. Ö nen. Prism-privacy-preserving search in MapReduce. In S. Fischer-Hübner and M. Wright, editors, Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012.
-
(2012)
Privacy Enhancing Technologies, of Lecture Notes in Computer Science.
, vol.7384
-
-
Blass, E.-O.1
Di Pietro, R.2
Molva, R.3
Nen, M.O.4
-
13
-
-
84889685086
-
Verifying computations with state
-
B. Braun, A. J. Feldman, Z. Ren, S. Setty, A. J. Blumberg, and M. Walfish. Verifying computations with state. In ACM Symposium on Operating Systems Principles (SOSP), 2013.
-
(2013)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Braun, B.1
Feldman, A.J.2
Ren, Z.3
Setty, S.4
Blumberg, A.J.5
Walfish, M.6
-
16
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
17
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2008.
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
20
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat. MapReduce: simplified data processing on large clusters. Commun. ACM, 51(1), 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.1
-
-
Dean, J.1
Ghemawat, S.2
-
26
-
-
85076877276
-
Ironclad apps: End-to-end security via automated full-system verification
-
C. Hawblitzel, J. Howell, J. R. Lorch, A. Narayan, B. Parno, D. Zhang, and B. Zill. Ironclad Apps: End-to-end security via automated full-system verification. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014.
-
(2014)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Hawblitzel, C.1
Howell, J.2
Lorch, J.R.3
Narayan, A.4
Parno, B.5
Zhang, D.6
Zill, B.7
-
27
-
-
84945211824
-
Using innovative instructions to create trustworthy software solutions
-
M. Hoekstra, R. Lal, P. Pappachan, C. Rozas, V. Phegade, and J. del Cuvillo. Using innovative instructions to create trustworthy software solutions. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP), 2013.
-
(2013)
Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Rozas, C.4
Phegade, V.5
Del Cuvillo, J.6
-
28
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. Inktag: Secure applications on an untrusted operating system. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2013.
-
(2013)
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
30
-
-
34447569672
-
-
Intel Corp.325462-048
-
Intel Corp. Intel 64 and IA-32 architectures software developer's manual-combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c, 2013. No. 325462-048.
-
(2013)
Intel 64 and IA-32 Architectures Software Developer's Manual-combined Volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c
-
-
-
34
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014.
-
(2014)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
36
-
-
85077468673
-
MiniBox: A two-way sandbox for x86 native code
-
Y. Li, J. McCune, J. Newsome, A. Perrig, B. Baker, and W. Drewry. MiniBox: A two-way sandbox for x86 native code. In Usenix ATC, 2014.
-
(2014)
Usenix ATC
-
-
Li, Y.1
McCune, J.2
Newsome, J.3
Perrig, A.4
Baker, B.5
Drewry, W.6
-
37
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, M. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2000.
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Lie, D.1
Thekkath, M.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
38
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. D. Gligor, and A. Perrig. Trustvisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
39
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. In European Conference on Computer Systems (EuroSys), 2008.
-
(2008)
European Conference on Computer Systems (EuroSys)
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
41
-
-
84903968494
-
Innovative instructions and software model for isolated execution
-
F. Mckeen, I. Alexandrovich, A. Berenzon, C. Rozas, H. Shafi, V. Shanbhogue, and U. Savagaonkar. Innovative instructions and software model for isolated execution. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP), 2013.
-
(2013)
Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
-
-
Mckeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.7
-
45
-
-
84945211829
-
The melbourne shuffle: Improving oblivious storage in the cloud
-
O. Ohrimenko, M. T. Goodrich, R. Tamassia, and E. Upfal. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata, Languages and Programming (ICALP), 2014.
-
(2014)
International Colloquium on Automata, Languages and Programming (ICALP)
-
-
Ohrimenko, O.1
Goodrich, M.T.2
Tamassia, R.3
Upfal, E.4
-
46
-
-
84889021626
-
Oasis: On achieving a sanctuary for integrity and secrecy on untrusted platforms
-
E. Owusu, J. Guajardo, J. McCune, J. Newsome, A. Perrig, and A. Vasudevan. Oasis: On achieving a sanctuary for integrity and secrecy on untrusted platforms. In ACM Conference on Computer and Communications Security (CCS), 2013.
-
(2013)
ACM Conference on Computer and Communications Security (CCS)
-
-
Owusu, E.1
Guajardo, J.2
McCune, J.3
Newsome, J.4
Perrig, A.5
Vasudevan, A.6
-
49
-
-
70350512695
-
A comparison of approaches to large-scale data analysis
-
A. Pavlo, E. Paulson, A. Rasin, D. J. Abadi, D. J. DeWitt, S. Madden, and M. Stonebraker. A comparison of approaches to large-scale data analysis. In ACM SIGMOD International Conference on Management of Data, 2009.
-
(2009)
ACM SIGMOD International Conference on Management of Data
-
-
Pavlo, A.1
Paulson, E.2
Rasin, A.3
Abadi, D.J.4
DeWitt, D.J.5
Madden, S.6
Stonebraker, M.7
-
51
-
-
85076880634
-
Building web applications on top of encrypted data using Mylar
-
R. A. Popa, E. Stark, J. Helfer, S. Valdez, N. Zeldovich, M. F. Kaashoek, and H. Balakrishnan. Building web applications on top of encrypted data using Mylar. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2014.
-
(2014)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Popa, R.A.1
Stark, E.2
Helfer, J.3
Valdez, S.4
Zeldovich, N.5
Kaashoek, M.F.6
Balakrishnan, H.7
-
52
-
-
85015649873
-
Airavat: Security and privacy for mapreduce
-
I. Roy, S. T. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.
-
(2010)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Roy, I.1
Setty, S.T.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
55
-
-
84945211833
-
-
Technical Report MSR-TR-2014-39, Microsoft Research
-
F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich. V C3: Trustworthy data analytics in the cloud. Technical Report MSR-TR-2014-39, Microsoft Research, 2014.
-
(2014)
V C3: Trustworthy Data Analytics in the Cloud
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
57
-
-
84954540412
-
ICE: A passive, high-speed, state-continuity scheme
-
R. Strackx, B. Jacobs, and F. Piessens. ICE: A passive, high-speed, state-continuity scheme. In Anual Computer Security Applications Conference (ACSAC), 2014.
-
(2014)
Anual Computer Security Applications Conference (ACSAC)
-
-
Strackx, R.1
Jacobs, B.2
Piessens, F.3
-
59
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In International Conference on Supercomputing (ICS), 2003.
-
(2003)
International Conference on Supercomputing (ICS)
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
61
-
-
84888194786
-
MrCrypt: Static analysis for secure cloud computations
-
S. D. Tetali, M. Lesani, R. Majumdar, and T. Millstein. MrCrypt: Static analysis for secure cloud computations. In Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 2013.
-
(2013)
Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
-
-
Tetali, S.D.1
Lesani, M.2
Majumdar, R.3
Millstein, T.4
-
68
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
C. Wright, L. Ballard, S. Coull, F. Monrose, and G. Masson. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
|