-
2
-
-
79951801836
-
Iot gateway: Bridgingwireless sensor networks into internet of things
-
Dec
-
Q. Zhu, R. Wang, Q. Chen, Y. Liu, and W. Qin, "Iot gateway: Bridgingwireless sensor networks into internet of things," 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347-352, Dec. 2010.
-
(2010)
8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
, pp. 347-352
-
-
Zhu, Q.1
Wang, R.2
Chen, Q.3
Liu, Y.4
Qin, W.5
-
3
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the ARM trustzone secure world
-
Nov
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen, "Hypervision across worlds: real-time kernel protection from the ARM trustzone secure world," ACM SIGSAC Conference on Computer and Communications Security, pp. 90-102, Nov. 2014.
-
(2014)
ACM SIGSAC Conference on Computer and Communications Security
, pp. 90-102
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
4
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & privacy, vol. 9, issue 2, pp. 50-57, 2011.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
5
-
-
84928795189
-
TEE: A virtual DRTM based execution environment for secure cloudend computing
-
W. Dai, H. Jin, D. Zou, S. Xu, W. Zheng, L. Shi, and L. T. Yang, "TEE: A virtual DRTM based execution environment for secure cloudend computing," Future Generation Computer Systems, vol. 49, pp. 47-57, 2015.
-
(2015)
Future Generation Computer Systems
, vol.49
, pp. 47-57
-
-
Dai, W.1
Jin, H.2
Zou, D.3
Xu, S.4
Zheng, W.5
Shi, L.6
Yang, L.T.7
-
6
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
Oct
-
A. Baumann, M. Peinado, and G. Hunt, "Shielding applications from an untrusted cloud with haven," 11th USENIX conference on Operating Systems Design and Implementation(OSDI), pp. 267-283, Oct. 2014.
-
(2014)
11th USENIX Conference on Operating Systems Design and Implementation(OSDI)
, pp. 267-283
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
7
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
May
-
Y. Fu, and Z. Lin, "Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection," 33rd IEEE Symposium on Security and Privacy, pp. 586-600, May 2012.
-
(2012)
33rd IEEE Symposium on Security and Privacy
, pp. 586-600
-
-
Fu, Y.1
Lin, Z.2
-
8
-
-
84901246064
-
Evolution, detection and analysis of malware for smart devices
-
G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, "Evolution, detection and analysis of malware for smart devices," IEEE Communications Surveys & Tutorials, vol. 16, issue 2, pp. 961-987, 2014.
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.2
, pp. 961-987
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Ribagorda, A.4
-
9
-
-
70349253246
-
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
-
Oct
-
J. Winter, "Trusted computing building blocks for embedded linux-based ARM trustzone platforms," 3rd ACM workshop on Scalable trusted computing, pp. 21-30, Oct. 2008.
-
(2008)
3rd ACM Workshop on Scalable Trusted Computing
, pp. 21-30
-
-
Winter, J.1
-
10
-
-
84908590919
-
Simplifying virtual machine introspection using libvmi
-
B. D. Payne, "Simplifying virtual machine introspection using libvmi," Sandia Report, 2012.
-
(2012)
Sandia Report
-
-
Payne, B.D.1
-
11
-
-
84884996603
-
Bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
Y. Fu and Z. Lin, "Bridging the semantic gap in virtual machine introspection via online kernel data redirection," ACM Transactions on Information and System Security (TISSEC), vol. 16, issue 7, 2013.
-
(2013)
ACM Transactions on Information and System Security (TISSEC)
, vol.16
, Issue.7
-
-
Fu, Y.1
Lin, Z.2
|