-
9
-
-
84954189555
-
-
System Programming. Pub. no. 24593 rev. 3.23
-
AMD. AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.23, 2013.
-
(2013)
AMD 64 Architecture Programmer's Manual
, vol.2
-
-
AMD1
-
11
-
-
84863085822
-
Virtualization based password protection against malware in untrusted operating systems
-
Berlin, Heidelberg,. Springer-Verlag
-
Y. Cheng and X. Ding. Virtualization based password protection against malware in untrusted operating systems. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST'12, pages 201-218, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST'12
, pp. 201-218
-
-
Cheng, Y.1
Ding, X.2
-
13
-
-
77952266871
-
GPU virtualization on vmware's hosted i/o architecture
-
July
-
M. Dowty and J. Sugerman. Gpu virtualization on vmware's hosted i/o architecture. SIGOPS Oper. Syst. Rev., 43(3):73-82, July 2009.
-
(2009)
SIGOPS Oper. Syst. Rev.
, vol.43
, Issue.3
, pp. 73-82
-
-
Dowty, M.1
Sugerman, J.2
-
14
-
-
84974757646
-
A high assurance window system prototype
-
J. Epstein, C. Inc, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Danner, C. R. Martin, M. Branstad, G. Benson, and D. Rothnie. A high assurance window system prototype. Journal of Computer Security, 2(2):159-190, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2
, pp. 159-190
-
-
Epstein, J.1
Inc, C.2
McHugh, J.3
Orman, H.4
Pascale, R.5
Marmor-Squires, A.6
Danner, B.7
Martin, C.R.8
Branstad, M.9
Benson, G.10
Rothnie, D.11
-
15
-
-
0026281520
-
A prototype b3 trusted x window system
-
Dec
-
J. Epstein, J. McHugh, R. Pascale, H. Orman, G. Benson, C. Martin, A. Marmor-Squires, B. Danner, and M. Branstad. A prototype b3 trusted x window system. In Computer Security Applications Conference, 1991. Proceedings., Seventh Annual, pages 44-55, Dec 1991.
-
(1991)
Computer Security Applications Conference, 1991. Proceedings., Seventh Annual
, pp. 44-55
-
-
Epstein, J.1
McHugh, J.2
Pascale, R.3
Orman, H.4
Benson, G.5
Martin, C.6
Marmor-Squires, A.7
Danner, B.8
Branstad, M.9
-
16
-
-
53349090243
-
A closer look at GPUs
-
Oct
-
K. Fatahalian and M. Houston. A closer look at GPUs. Commun. ACM, 51(10):50-57, Oct. 2008.
-
(2008)
Commun ACM
, vol.51
, Issue.10
, pp. 50-57
-
-
Fatahalian, K.1
Houston, M.2
-
19
-
-
84921790825
-
Security limitations of virtualization and how to overcome them
-
Cambridge University
-
V. D. Gligor. Security limitations of virtualization and how to overcome them. In Proc. International Workshop on Security Protocols, Cambridge University, 2010.
-
(2010)
Proc. International Workshop on Security Protocols
-
-
Gligor, V.D.1
-
20
-
-
62349096287
-
Screen oriented technique for reducing the incidence of shoulder surfing
-
B. Hoanca and K. J. Mock. Screen oriented technique for reducing the incidence of shoulder surfing. In Security and Management, pages 334-340, 2005.
-
(2005)
Security and Management
, pp. 334-340
-
-
Hoanca, B.1
Mock, K.J.2
-
21
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In Proc. International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
-
(2013)
Proc. International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
27
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In Proc. ACM Symposium on Operating Systems Principles, 2009.
-
(2009)
Proc. ACM Symposium on Operating Systems Principles
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
29
-
-
84914100506
-
Stealing webpages rendered on your browser by exploiting GPU vulnerabilities
-
Berkeley, CA, USA, May 18-21, 2014
-
S. Lee, Y. Kim, J. Kim, and J. Kim. Stealing webpages rendered on your browser by exploiting GPU vulnerabilities. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 19-33, 2014.
-
(2014)
2014 IEEE Symposium on Security and Privacy, SP 2014
, pp. 19-33
-
-
Lee, S.1
Kim, Y.2
Kim, J.3
Kim, J.4
-
30
-
-
84914163660
-
Lessons from VAX/SVS for high assurance VM systems
-
S. Lipner, T. Jaeger, and M. E. Zurko. Lessons from VAX/SVS for high assurance VM systems. IEEE Security and Privacy, 10(6):26-35, 2012.
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.6
, pp. 26-35
-
-
Lipner, S.1
Jaeger, T.2
Zurko, M.E.3
-
33
-
-
84885595267
-
Cloud terminal: Secure access to sensitive applications from untrusted systems
-
Berkeley, CA, USA. USENIX Association
-
L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica. Cloud terminal: Secure access to sensitive applications from untrusted systems. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12, pages 14-14, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12
, pp. 14
-
-
Martignoni, L.1
Poosankam, P.2
Zaharia, M.3
Han, J.4
McCamant, S.5
Song, D.6
Paxson, V.7
Perrig, A.8
Shenker, S.9
Stoica, I.10
-
34
-
-
84916634321
-
Confidentiality issues on a GPU in a virtualized environment
-
N. Christin and R. Safavi-Naini, editors, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, volume 8437 of Lecture Notes in Computer Science, Springer
-
C. Maurice, C. Neumann, O. Heen, and A. Francillon. Confidentiality issues on a GPU in a virtualized environment. In N. Christin and R. Safavi-Naini, editors, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, volume 8437 of Lecture Notes in Computer Science, pages 119-135. Springer, 2014.
-
(2014)
Financial Cryptography and Data Security - 18th International Conference, FC 2014
, pp. 119-135
-
-
Maurice, C.1
Neumann, C.2
Heen, O.3
Francillon, A.4
-
35
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In Proc. IEEE Symposium on Security and Privacy, 2010.
-
(2010)
Proc. IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
39
-
-
49049088756
-
GPU computing
-
May
-
J. flowens, M. Houston, D. Luebke, S. Green, J. Stone, and J. Phillips. GPU computing. Proceedings of the IEEE, 96(5):879-899, May 2008.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.5
, pp. 879-899
-
-
Flowens, J.1
Houston, M.2
Luebke, D.3
Green, S.4
Stone, J.5
Phillips, J.6
-
40
-
-
84933518796
-
-
Apress, Berkely, CA, USA, 1st edition
-
X. Ruan. Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine. Apress, Berkely, CA, USA, 1st edition, 2014.
-
(2014)
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
-
-
Ruan, X.1
-
42
-
-
85084163031
-
Design of the EROS trusted window system
-
SSYM'04, Berkeley, CA, USA,. USENIX Association
-
J. S. Shapiro, J. Vanderburgh, E. Northup, and D. Chizmadia. Design of the EROS trusted window system. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 12-12, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 12
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
Chizmadia, D.4
-
43
-
-
70349157930
-
Secure 3D graphics for virtual machines
-
New York, NY, USA, ACM
-
C. Smowton. Secure 3D graphics for virtual machines. In Proceedings of the Second European Workshop on System Security, EUROSEC '09, pages 36-43, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the Second European Workshop on System Security, EUROSEC '09
, pp. 36-43
-
-
Smowton, C.1
-
45
-
-
85077458357
-
GPUvm: Why not virtualizing GPUs at the hypervisor?
-
Philadelphia, PA, June. USENIX Association
-
Y. Suzuki, S. Kato, H. Yamada, and K. Kono. GPUvm: Why not virtualizing GPUs at the hypervisor? In 2014 USENIX Annual Technical Conference (USENIX ATC 14), pages 109-120, Philadelphia, PA, June 2014. USENIX Association.
-
(2014)
2014 USENIX Annual Technical Conference (USENIX ATC 14)
, pp. 109-120
-
-
Suzuki, Y.1
Kato, S.2
Yamada, H.3
Kono, K.4
-
46
-
-
85077449318
-
A full GPU virtualization solution with mediated pass-through
-
Philadelphia, PA, June. USENIX Association
-
K. Tian, Y. Dong, and D. Cowperthwaite. A full GPU virtualization solution with mediated pass-through. In 2014 USENIX Annual Technical Conference (USENIX ATC 14), pages 121-132, Philadelphia, PA, June 2014. USENIX Association.
-
(2014)
2014 USENIX Annual Technical Conference (USENIX ATC 14)
, pp. 121-132
-
-
Tian, K.1
Dong, Y.2
Cowperthwaite, D.3
-
47
-
-
84881219022
-
Design, implementation and verification of an extensible and modular hypervisor framework
-
A. Vasudevan, S. Chaki, L. Jia, J. McCune, J. Newsome, and A. Datta. Design, implementation and verification of an extensible and modular hypervisor framework. In Proc. IEEE Symposium on Security and Privacy, 2013.
-
(2013)
Proc. IEEE Symposium on Security and Privacy
-
-
Vasudevan, A.1
Chaki, S.2
Jia, L.3
McCune, J.4
Newsome, J.5
Datta, A.6
-
52
-
-
2942744785
-
Secure information display with limited viewing zone by use of multi-color visual cryptography
-
H. Yamamoto, Y. Hayasaki, and N. Nishida. Secure information display with limited viewing zone by use of multi-color visual cryptography. Optics express, 12(7):1258-1270, 2004.
-
(2004)
Optics Express
, vol.12
, Issue.7
, pp. 1258-1270
-
-
Yamamoto, H.1
Hayasaki, Y.2
Nishida, N.3
-
53
-
-
84880066589
-
VGRIS: Virtualized GPU resource isolation and scheduling in cloud gaming
-
New York, NY, USA, ACM
-
M. Yu, C. Zhang, Z. Qi, J. Yao, Y. Wang, and H. Guan. VGRIS: Virtualized gpu resource isolation and scheduling in cloud gaming. In Proceedings of the 22nd International Symposium on High-performance Parallel and Distributed Computing, HPDC '13, pages 203-214, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 22nd International Symposium on High-performance Parallel and Distributed Computing, HPDC '13
, pp. 203-214
-
-
Yu, M.1
Zhang, C.2
Qi, Z.3
Yao, J.4
Wang, Y.5
Guan, H.6
-
54
-
-
84888352157
-
Making information flow explicit in HiStar
-
OSDI '06, Berkeley, CA, USA,. USENIX Association
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Maziéres. Making information flow explicit in HiStar. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7, OSDI '06, pages 19-19, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
, vol.7
, pp. 19
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Maziéres, D.4
|