-
3
-
-
84950254197
-
-
The connection methods to the X server. URL https://www.debian.org/doc/manuals/debian-reference/ch07.en.html#-the-connection-methods-to-the-x-server.
-
-
-
The connection methods to the X server1
-
7
-
-
84950281784
-
-
X Window System. URL http://en. wikipedia.org/wiki/X-Window-System.
-
-
-
X Window System1
-
9
-
-
72449145808
-
Controlflow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Controlflow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC), 13(1):4, 2009.
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.1
, pp. 4
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
10
-
-
85084014165
-
Orthogonal security with cipherbase
-
Jan.
-
A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal security with cipherbase. In 6th Conference on Innovative Data Systems Research, Jan. 2013.
-
(2013)
6th Conference on Innovative Data Systems Research
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
Kaushik, R.4
Kossmann, D.5
Ramamurthy, R.6
Venkatesan, R.7
-
12
-
-
84877720812
-
Composing OS extensions safely and efficiently with bascule
-
ACM
-
A. Baumann, D. Lee, P. Fonseca, L. Glendenning, J. R. Lorch, B. Bond, R. Olinsky, and G. C. Hunt. Composing os extensions safely and efficiently with bascule. In Proceedings of the 8th ACM European Conference on Computer Systems, pages 239-252. ACM, 2013.
-
(2013)
Proceedings of the 8th ACM European Conference on Computer Systems
, pp. 239-252
-
-
Baumann, A.1
Lee, D.2
Fonseca, P.3
Glendenning, L.4
Lorch, J.R.5
Bond, B.6
Olinsky, R.7
Hunt, G.C.8
-
15
-
-
58049139900
-
-
H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, and W. Mao. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. 2007.
-
(2007)
Tamper-resistant Execution in an Untrusted Operating System Using a Virtual Machine Monitor
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Yang, Z.4
Chen, R.5
Zang, B.6
Mao, W.7
-
16
-
-
67650067345
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
ACM
-
X. Chen, T. Garfinkel, E. Lewis, P. Subrahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin, and D. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In ACM SIGPLAN Notices, volume 43, pages 2-13. ACM, 2008.
-
(2008)
ACM SIGPLAN Notices
, vol.43
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.3
Subrahmanyam, P.4
Waldspurger, C.5
Boneh, D.6
Dwoskin, J.7
Ports, D.8
-
18
-
-
84950301911
-
Lagrande technology preliminary architecture specification
-
I. Corporation. Lagrande technology preliminary architecture specification. Intel Publication, (D52212), 2006.
-
(2006)
Intel Publication
, vol.D52212
-
-
Corporation, I.1
-
20
-
-
84950258003
-
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture
-
Y. Dai, Y. Shi, Y. Qi, J. Ren, and P. Wang. Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. Frontiers of Computer Science, pages 1-10.
-
Frontiers of Computer Science
, pp. 1-10
-
-
Dai, Y.1
Shi, Y.2
Qi, Y.3
Ren, J.4
Wang, P.5
-
21
-
-
84875824009
-
A lightweight vmm on many core for high performance computing
-
ACM
-
Y. Dai, Y. Qi, J. Ren, Y. Shi, X. Wang, and X. Yu. A lightweight VMM on many core for high performance computing. In Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on Virtual Execution Environments, pages 111-120. ACM, 2013.
-
(2013)
Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 111-120
-
-
Dai, Y.1
Qi, Y.2
Ren, J.3
Shi, Y.4
Wang, X.5
Yu, X.6
-
22
-
-
39049169674
-
Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection
-
IEEE
-
G. Duc and R. Keryell. Cryptopage: an efficient secure architecture with memory encryption, integrity and information leakage protection. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 483-492. IEEE, 2006.
-
(2006)
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual
, pp. 483-492
-
-
Duc, G.1
Keryell, R.2
-
23
-
-
84977840356
-
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
-
A. M. Dunn, M. Z. Lee, S. Jana, S. Kim, M. Silberstein, Y. Xu, V. Shmatikov, and E. Witchel. Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels. In Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012.
-
(2012)
Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Dunn, A.M.1
Lee, M.Z.2
Jana, S.3
Kim, S.4
Silberstein, M.5
Xu, Y.6
Shmatikov, V.7
Witchel, E.8
-
25
-
-
80051945078
-
Uni-directional trusted path: Transaction confirmation on just one device
-
IEEE
-
A. Filyanov, J. M. McCuney, A.-R. Sadeghiz, and M. Winandy. Uni-directional trusted path: Transaction confirmation on just one device. In Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International Conference on, pages 1-12. IEEE, 2011.
-
(2011)
Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International Conference on
, pp. 1-12
-
-
Filyanov, A.1
McCuney, J.M.2
Sadeghiz, A.-R.3
Winandy, M.4
-
26
-
-
35948950577
-
Safe hardware access with the xen virtual machine monitor
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe hardware access with the xen virtual machine monitor. In 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS), pages 1-1, 2004.
-
(2004)
1st Workshop on Operating System and Architectural Support for the on Demand IT InfraStructure (OASIS)
, pp. 1-1
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
27
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In ACM SIGOPS Operating Systems Review, volume 37, pages 193-206. ACM, 2003.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
31
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
ACM
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. InkTag: Secure Applications On An Untrusted Operating System. In Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, (ASPLOS), pages 265-278. ACM, 2013.
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, (ASPLOS)
, pp. 265-278
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
32
-
-
85030776494
-
Kguard: Lightweight kernel protection against return-to-user attacks
-
Berkeley, CA, USA, USENIX Association
-
V. P. Kemerlis, G. Portokalidis, and A. D. Keromytis. kguard: Lightweight kernel protection against return-to-user attacks. In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
-
-
Kemerlis, V.P.1
Portokalidis, G.2
Keromytis, A.D.3
-
35
-
-
0034445599
-
Architectural support for Copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. ACM SIGPLAN Notices, 35(11):168-177, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
36
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
IEEE
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In IEEE Symposium on Security and Privacy (SP), pages 143-158. IEEE, 2010.
-
(2010)
IEEE Symposium on Security and Privacy (SP)
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
37
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
ACM
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, page 10. ACM, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
, pp. 10
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
40
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. Redfield, N. Xeldovich, and H. Balakrishnan. Cryptdb: Protecting confidentiality with encrypted query processing. In 23rd ACM Symposium on Operating Systems Principles, pages 85-100, 2011.
-
(2011)
23rd ACM Symposium on Operating Systems Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.2
Xeldovich, N.3
Balakrishnan, H.4
-
42
-
-
85084163031
-
Design of the eros trusted window system
-
USENIX Association
-
J. S. Shapiro, J. Vanderburgh, E. Northup, and D. Chizmadia. Design of the eros trusted window system. In Proceedings of the 13th conference on USENIX Security Symposium-Volume 13, pages 12-12. USENIX Association, 2004.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium-volume 13
, pp. 12-12
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
Chizmadia, D.4
-
45
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamperresistant processing
-
G. E. Suh, D. Clarke, B. Gassend, M. Van Dijk, and S. Devadas. AEGIS: architecture for tamper-evident and tamperresistant processing. In Proceedings of the 17th annual international conference on Supercomputing, pages 160-171, 2003.
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
46
-
-
84888805968
-
Mrcrypt: Static analysis for secure cloud computations
-
ACM
-
S. D. Tetali, M. Lesani, R. Majumdar, and T. Millstein. Mrcrypt: static analysis for secure cloud computations. In Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications, pages 271-286. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications
, pp. 271-286
-
-
Tetali, S.D.1
Lesani, M.2
Majumdar, R.3
Millstein, T.4
-
49
-
-
85041451135
-
Control flow integrity for cots binaries
-
M. Zhang and R. Sekar. Control flow integrity for cots binaries. In Usenix Security, pages 337-352, 2013.
-
(2013)
Usenix Security
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
-
50
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
IEEE
-
Z. Zhou, V. Gligor, J. Newsome, and J. McCune. Building verifiable trusted path on commodity x86 computers. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 616-630. IEEE, 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 616-630
-
-
Zhou, Z.1
Gligor, V.2
Newsome, J.3
McCune, J.4
|