-
1
-
-
84958633913
-
-
Accessed: 2014-10-07
-
Cubieboard2. http://cubieboard.org/model/cb2/. Accessed: 2014-10-07.
-
-
-
-
4
-
-
84865678310
-
-
ARMv7-A and ARMv7-R edition. Whitepaper, July
-
ARM Architecture Reference Manual. ARMv7-A and ARMv7-R edition. Whitepaper, July 2012.
-
(2012)
ARM Architecture Reference Manual
-
-
-
7
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
-
New York, NY, USA ACM
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 90-102, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14
, pp. 90-102
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
8
-
-
80051569914
-
-
accessed July 28th, 2015
-
C. Dall and J. Nieh. Kvm for arm. Available at http://systems.cs.columbia.edu/files/wpid-ols2010-kvmarm.pdf, accessed July 28th, 2015.
-
Kvm for Arm
-
-
Dall, C.1
Nieh, J.2
-
9
-
-
84897759668
-
Kvm/arm: The design and implementation of the linux arm hypervisor
-
C. Dall and J. Nieh. Kvm/arm: the design and implementation of the linux arm hypervisor. ACM SIGARCH Computer Architecture News, 42(1):333-348, 2014.
-
(2014)
ACM SIGARCH Computer Architecture News
, vol.42
, Issue.1
, pp. 333-348
-
-
Dall, C.1
Nieh, J.2
-
10
-
-
84969353312
-
Graphical user interface for virtualized mobile handsets
-
J. Danisevskis, M. Peter, J. Nordholz, M. Petschick, and J. Vetter. Graphical user interface for virtualized mobile handsets. In IEEE S&P MoST, 2015.
-
(2015)
IEEE S&P MoST
-
-
Danisevskis, J.1
Peter, M.2
Nordholz, J.3
Petschick, M.4
Vetter, J.5
-
11
-
-
78650208546
-
Towards customizable, application specific mobile trusted modules
-
New York, NY, USA ACM
-
K. Dietrich and J. Winter. Towards customizable, application specific mobile trusted modules. In Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC '10, pages 31-40, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC '10
, pp. 31-40
-
-
Dietrich, K.1
Winter, J.2
-
12
-
-
84897815337
-
Armvisor: System virtualization for arm
-
J.-H. Ding, C.-J. Lin, P.-H. Chang, C.-H. Tsang, W.-C. Hsu, and Y.-C. Chung. Armvisor: System virtualization for arm. In Proceedings of the Ottawa Linux Symposium (OLS), pages 93-107, 2012.
-
(2012)
Proceedings of the Ottawa Linux Symposium (OLS)
, pp. 93-107
-
-
Ding, J.-H.1
Lin, C.-J.2
Chang, P.-H.3
Tsang, C.-H.4
Hsu, W.-C.5
Chung, Y.-C.6
-
13
-
-
84855358190
-
Arm trustzone as a virtualization technique in embedded systems
-
Nairobi, Kenya
-
T. Frenzel, A. Lackorzynski, A. Warg, and H. Härtig. Arm trustzone as a virtualization technique in embedded systems. In Proceedings of Twelfth Real-Time Linux Workshop, Nairobi, Kenya, 2010.
-
(2010)
Proceedings of Twelfth Real-Time Linux Workshop
-
-
Frenzel, T.1
Lackorzynski, A.2
Warg, A.3
Härtig, H.4
-
15
-
-
84939170403
-
Ret2dir: Rethinking kernel isolation
-
San Diego, CA, Aug. USENIX Association.
-
V. P. Kemerlis, M. Polychronakis, and A. D. Keromytis. ret2dir: Rethinking kernel isolation. In 23rd USENIX Security Symposium (USENIX Security 14), pages 957-972, San Diego, CA, Aug. 2014. USENIX Association.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
, pp. 957-972
-
-
Kemerlis, V.P.1
Polychronakis, M.2
Keromytis, A.D.3
-
16
-
-
85030776494
-
Kguard: Lightweight kernel protection against return-to-user attacks
-
Bellevue, WA USENIX
-
V. P. Kemerlis, G. Portokalidis, and A. D. Keromytis. kguard: Lightweight kernel protection against return-to-user attacks. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12), pages 459-474, Bellevue, WA, 2012. USENIX.
-
(2012)
Presented as Part of the 21st USENIX Security Symposium (USENIX Security 12)
, pp. 459-474
-
-
Kemerlis, V.P.1
Portokalidis, G.2
Keromytis, A.D.3
-
18
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
May
-
J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. Trustvisor: Efficient tcb reduction and attestation. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 143-158, May 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium On
, pp. 143-158
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
19
-
-
85084160699
-
Lmbench: Portable tools for performance analysis
-
San Diego, CA, USA
-
L. W. McVoy, C. Staelin, et al lmbench: Portable tools for performance analysis. In USENIX annual technical conference, pages 279-294. San Diego, CA, USA, 1996.
-
(1996)
USENIX Annual Technical Conference
, pp. 279-294
-
-
McVoy, L.W.1
Staelin, C.2
-
20
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
Berlin, Heidelberg Springer-Verlag.
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, RAID '08, pages 1-20, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, RAID '08
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
21
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
New York, NY, USA ACM
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 335-350, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
22
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
New York, NY, USA ACM
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 552-561, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 552-561
-
-
Shacham, H.1
-
26
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
IEEE
-
Z. Wang and X. Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 380-395. IEEE, 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium On
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
|