메뉴 건너뛰기




Volumn 50, Issue 7, 2015, Pages 187-199

Appsec: A safe execution environment for security sensitive applicationst

Author keywords

Human machine interaction; Kernel; Privacy; VMM

Indexed keywords

DATA PRIVACY; HUMAN COMPUTER INTERACTION; MAN MACHINE SYSTEMS;

EID: 84950288948     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/2731186.2731199     Document Type: Conference Paper
Times cited : (8)

References (50)
  • 3
    • 84950254197 scopus 로고    scopus 로고
    • The connection methods to the X server. URL https://www.debian.org/doc/manuals/debian-reference/ch07.en.html#-the-connection-methods-to-the-x-server.
    • The connection methods to the X server1
  • 7
    • 84950281784 scopus 로고    scopus 로고
    • X Window System. URL http://en. wikipedia.org/wiki/X-Window-System.
    • X Window System1
  • 18
    • 84950301911 scopus 로고    scopus 로고
    • Lagrande technology preliminary architecture specification
    • I. Corporation. Lagrande technology preliminary architecture specification. Intel Publication, (D52212), 2006.
    • (2006) Intel Publication , vol.D52212
    • Corporation, I.1
  • 20
    • 84950258003 scopus 로고    scopus 로고
    • Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture
    • Y. Dai, Y. Shi, Y. Qi, J. Ren, and P. Wang. Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. Frontiers of Computer Science, pages 1-10.
    • Frontiers of Computer Science , pp. 1-10
    • Dai, Y.1    Shi, Y.2    Qi, Y.3    Ren, J.4    Wang, P.5
  • 22
    • 39049169674 scopus 로고    scopus 로고
    • Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection
    • IEEE
    • G. Duc and R. Keryell. Cryptopage: an efficient secure architecture with memory encryption, integrity and information leakage protection. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 483-492. IEEE, 2006.
    • (2006) Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual , pp. 483-492
    • Duc, G.1    Keryell, R.2
  • 49
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for cots binaries
    • M. Zhang and R. Sekar. Control flow integrity for cots binaries. In Usenix Security, pages 337-352, 2013.
    • (2013) Usenix Security , pp. 337-352
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.