-
4
-
-
84897781978
-
Innovative technology for CPU based attestation and sealing
-
Tel-Aviv, Israel
-
I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata. Innovative Technology for CPU Based Attestation and Sealing. In International Workshop on Hardware and Architectural Support for Security and Privacy, pages 1-8, Tel-Aviv, Israel, 2013.
-
(2013)
International Workshop on Hardware and Architectural Support for Security and Privacy
, pp. 1-8
-
-
Anati, I.1
Gueron, S.2
Johnson, S.P.3
Scarlata, V.R.4
-
6
-
-
33749405352
-
Trusted computing: Providing security for peer-to-peer networks
-
Aug
-
S. Balfe, A. Lakhani, and K. Paterson. Trusted computing: providing security for peer-to-peer networks. In Peer-to-Peer Computing, Fifth IEEE International Conference on, pages 117-124, Aug 2005.
-
(2005)
Peer-to-Peer Computing, Fifth IEEE International Conference on
, pp. 117-124
-
-
Balfe, S.1
Lakhani, A.2
Paterson, K.3
-
7
-
-
84923534449
-
Shielding applications from an untrusted cloud with haven
-
A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In USENIX OSDI, 2014.
-
(2014)
USENIX OSDI
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
10
-
-
84951872820
-
CTPM: A cloud TPM for cross-device trusted applications
-
C. Chen, H. Raj, S. Saroiu, and A. Wolman. cTPM: A cloud TPM for cross-device trusted applications. In USENIX NSDI, 2014.
-
(2014)
USENIX NSDI
-
-
Chen, C.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
14
-
-
79952612270
-
Beyond secure channels
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond secure channels. In Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC '07, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC '07
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
16
-
-
84907313296
-
SDX: A software defined internet exchange
-
A. Gupta, L. Vanbever, M. Shahbaz, S. P. Donovan, B. Schlinker, N. Feamster, J. Rexford, S. Shenker, R. Clark, and E. Katz-Bassett. SDX: A software defined internet exchange. In ACM SIGCOMM, 2014.
-
(2014)
ACM SIGCOMM
-
-
Gupta, A.1
Vanbever, L.2
Shahbaz, M.3
Donovan, S.P.4
Schlinker, B.5
Feamster, N.6
Rexford, J.7
Shenker, S.8
Clark, R.9
Katz-Bassett, E.10
-
17
-
-
84870350022
-
A new approach to interdomain routing based on secure multi-party computation
-
D. Gupta, A. Segal, A. Panda, G. Segev, M. Schapira, J. Feigenbaum, J. Rexford, and S. Shenker. A new approach to interdomain routing based on secure multi-party computation. In ACM HotNets, 2012.
-
(2012)
ACM HotNets
-
-
Gupta, D.1
Segal, A.2
Panda, A.3
Segev, G.4
Schapira, M.5
Feigenbaum, J.6
Rexford, J.7
Shenker, S.8
-
20
-
-
84940476471
-
The sniper attack: Anonymously deanonymizing and disabling the tor network
-
R. Jansen, F. Tschorsch, A. Johnson, and B. Scheuermann. The sniper attack: Anonymously deanonymizing and disabling the tor network. Technical report, DTIC Document, 2014.
-
(2014)
Technical Report, DTIC Document
-
-
Jansen, R.1
Tschorsch, F.2
Johnson, A.3
Scheuermann, B.4
-
21
-
-
77955329624
-
Building incentives into tor
-
R. Sion, editor. Springer Berlin Heidelberg
-
T.-W. Johnny Ngan, R. Dingledine, and D. Wallach. Building incentives into tor. In R. Sion, editor, Financial Cryptography and Data Security, volume 6052 of Lecture Notes in Computer Science, pages 238-256. Springer Berlin Heidelberg, 2010.
-
(2010)
Financial Cryptography and Data Security of Lecture Notes in Computer Science
, vol.6052
, pp. 238-256
-
-
Johnny Ngan, T.-W.1
Dingledine, R.2
Wallach, D.3
-
22
-
-
85084096178
-
One bad apple spoils the bunch: Exploiting p2p applications to trace and profile tor users
-
S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, C. e. Castelluccia, A. Legout, andW. Dabbous. One bad apple spoils the bunch: Exploiting p2p applications to trace and profile tor users. In Proceedings of the 4th USENIX Conference on Largescale Exploits and Emergent Threats, pages 2-2, 2011.
-
(2011)
Proceedings of the 4th USENIX Conference on Largescale Exploits and Emergent Threats
, pp. 2
-
-
Le Blond, S.1
Manils, P.2
Chaabane, A.3
Kaafar, M.A.4
Castelluccia, C.E.5
Legout, A.6
Dabbous, W.7
-
23
-
-
85077468673
-
MiniBox: A two-way sandbox for x86 native code
-
June
-
Y. Li, J. M. McCune, J. Newsome, A. Perrig, B. Baker, and W. Drewry. MiniBox: A Two-Way Sandbox for x86 Native Code. In Proceedings of the USENIX Annual Technical Conference, June 2014.
-
(2014)
Proceedings of the USENIX Annual Technical Conference
-
-
Li, Y.1
McCune, J.M.2
Newsome, J.3
Perrig, A.4
Baker, B.5
Drewry, W.6
-
24
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In EUROSYS, pages 315-328, 2008.
-
(2008)
EUROSYS
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
25
-
-
84977837849
-
Nnovative instructions and software model for isolated execution
-
Tel-Aviv, Israel
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In International Workshop on Hardware and Architectural Support for Security and Privacy, pages 1-8, Tel-Aviv, Israel, 2013.
-
(2013)
International Workshop on Hardware and Architectural Support for Security and Privacy
, pp. 1-8
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
26
-
-
84889753542
-
Verifying and enforcing network paths with icing
-
J. Naous, M. Walfish, A. Nicolosi, D. Mazières, M. Miller, and A. Seehra. Verifying and enforcing network paths with icing. In ACM CoNEXT, 2011.
-
(2011)
ACM CoNEXT
-
-
Naous, J.1
Walfish, M.2
Nicolosi, A.3
Mazières, D.4
Miller, M.5
Seehra, A.6
-
27
-
-
84950321906
-
The cost of the "s"
-
D. Naylor, A. Finamore, I. Leontiadis, Y. Grunenberger, M. Mellia, M. Munafò, K. Papagiannaki, and P. Steenkiste. The cost of the "S" in HTTPS. In ACM CoNEXT, 2014.
-
(2014)
HTTPS ACM CoNEXT
-
-
Naylor, D.1
Finamore, A.2
Leontiadis, I.3
Grunenberger, Y.4
Mellia, M.5
Munafò, M.6
Papagiannaki, K.7
Steenkiste, P.8
-
28
-
-
84962271239
-
Multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS
-
D. Naylor, K. Schomp, M. Varvello, I. Leontiadis, J. Blackburn, D. Lopez, K. Papagiannaki, P. R. Rodriguez, and P. Steenkiste. multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS. In ACM SIGCOMM, 2015.
-
(2015)
ACM SIGCOMM
-
-
Naylor, D.1
Schomp, K.2
Varvello, M.3
Leontiadis, I.4
Blackburn, J.5
Lopez, D.6
Papagiannaki, K.7
Rodriguez, P.R.8
Steenkiste, P.9
-
31
-
-
84945211833
-
Vc3: Trustworthy data analytics in the cloud
-
Microsoft Research, February
-
F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich. Vc3: Trustworthy data analytics in the cloud. Technical Report MSR-TR-2014-39, Microsoft Research, February 2014.
-
(2014)
Technical Report MSR-TR-2014-39
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
34
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
35
-
-
84903973934
-
Spoiled onions: Exposing malicious tor exit relays
-
Springer
-
P.Winter, R. Köwer, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, and E. Weippl. Spoiled onions: Exposing malicious tor exit relays. In Privacy Enhancing Technologies, pages 304-331. Springer, 2014.
-
(2014)
Privacy Enhancing Technologies
, pp. 304-331
-
-
Winter, P.1
Köwer, R.2
Mulazzani, M.3
Huber, M.4
Schrittwieser, S.5
Lindskog, S.6
Weippl, E.7
-
36
-
-
51049099523
-
Nira: A new inter-domain routing architecture
-
Aug
-
X. Yang, D. Clark, and A. Berger. Nira: A new inter-domain routing architecture. Networking, IEEE/ACM Transactions on, 15 (4):775-788, Aug 2007.
-
(2007)
Networking IEEE/ACM Transactions on
, vol.15
, Issue.4
, pp. 775-788
-
-
Yang, X.1
Clark, D.2
Berger, A.3
-
37
-
-
80051959854
-
Scion: Scalability, control, and isolation on next-generation networks
-
X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen. Scion: Scalability, control, and isolation on next-generation networks. In IEEE Symposium on Security and Privacy, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
-
-
Zhang, X.1
Hsiao, H.-C.2
Hasker, G.3
Chan, H.4
Perrig, A.5
Andersen, D.G.6
-
38
-
-
84055200941
-
Network fault localization with small tcb
-
Oct
-
X. Zhang, Z. Zhou, G. Hasker, A. Perrig, and V. Gligor. Network fault localization with small tcb. In Network Protocols (ICNP), 2011 19th IEEE International Conference on, Oct 2011.
-
(2011)
Network Protocols (ICNP) 2011 19th IEEE International Conference on
-
-
Zhang, X.1
Zhou, Z.2
Hasker, G.3
Perrig, A.4
Gligor, V.5
-
39
-
-
84866489018
-
Private and verifiable interdomain routing decisions
-
M. Zhao, W. Zhou, A. J. Gurney, A. Haeberlen, M. Sherr, and B. T. Loo. Private and verifiable interdomain routing decisions. In ACM SIGCOMM, 2012.
-
(2012)
ACM SIGCOMM
-
-
Zhao, M.1
Zhou, W.2
Gurney, A.J.3
Haeberlen, A.4
Sherr, M.5
Loo, B.T.6
|