-
2
-
-
85084163253
-
Secure data deletion for Linux file systems
-
S. Bauer and N. Priyantha. Secure data deletion for Linux file systems. In USENIX Security, 2001.
-
(2001)
USENIX Security
-
-
Bauer, S.1
Priyantha, N.2
-
3
-
-
85076914568
-
A cryptographic file system for UNIX
-
M. Blaze. A cryptographic file system for UNIX. In CCS, 1994.
-
(1994)
CCS
-
-
Blaze, M.1
-
5
-
-
84870682965
-
Protecting confidential data on personal computers with storage capsules
-
K. Borders, E. V. Weele, B. Lau, and A. Prakash. Protecting confidential data on personal computers with storage capsules. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Borders, K.1
Weele, E.V.2
Lau, B.3
Prakash, A.4
-
7
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
8
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Shredding your garbage: Reducing data lifetime through secure deallocation. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
9
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
P. Colp, M. Nanavati, J. Zhu, W. Aiello, G. Coker, T. Deegan, P. Loscocco, and A. Warfield. Breaking up is hard to do: Security and functionality in a commodity hypervisor. In SOSP, 2011.
-
(2011)
SOSP
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
10
-
-
85076896624
-
Zero-interaction authentication
-
M. Corner and B. Noble. Zero-interaction authentication. In MOBICOM, 2004.
-
(2004)
MOBICOM
-
-
Corner, M.1
Noble, B.2
-
12
-
-
84947196743
-
Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications
-
A. Czeskis, D. J. S. Hilaire, K. Koscher, S. D. Gribble, T. Kohno, and B. Schneier. Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications. In HotSec, 2008.
-
(2008)
HotSec
-
-
Czeskis, A.1
Hilaire, D.J.S.2
Koscher, K.3
Gribble, S.D.4
Kohno, T.5
Schneier, B.6
-
14
-
-
85076887758
-
-
eCryptfs. https://launchpad.net/ecryptfs.
-
-
-
-
18
-
-
85063439754
-
Deniable cloud storage: Sharing files via public-key deniability
-
P. Gasti, G. Ateniese, and M. Blanton. Deniable cloud storage: Sharing files via public-key deniability. In WPES, 2010.
-
(2010)
WPES
-
-
Gasti, P.1
Ateniese, G.2
Blanton, M.3
-
19
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
P. Gutmann. Secure deletion of data from magnetic and solid-state memory. In USENIX Security, 1996.
-
(1996)
USENIX Security
-
-
Gutmann, P.1
-
20
-
-
85084163443
-
Data remanence in semiconductor devices
-
P. Gutmann. Data remanence in semiconductor devices. In USENIX Security, 2001.
-
(2001)
USENIX Security
-
-
Gutmann, P.1
-
21
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
22
-
-
36049035340
-
Protecting cryptographic keys from memory disclosure attacks
-
K. Harrison and S. Xu. Protecting cryptographic keys from memory disclosure attacks. In DSN, 2007.
-
(2007)
DSN
-
-
Harrison, K.1
Xu, S.2
-
23
-
-
34547403849
-
Secure deletion myths, issues, and solutions
-
N. Joukov, H. Papaxenopoulos, and E. Zadok. Secure deletion myths, issues, and solutions. In ACM Workshop on Storage Security and Survivability, 2006.
-
(2006)
ACM Workshop on Storage Security and Survivability
-
-
Joukov, N.1
Papaxenopoulos, H.2
Zadok, E.3
-
24
-
-
84979668035
-
Making programs forget: Enforcing lifetime for sensitive data
-
J. Kannan, G. Altekar, P. Maniatis, and B.-G. Chun. Making programs forget: Enforcing lifetime for sensitive data. In HotOS, 2011.
-
(2011)
HotOS
-
-
Kannan, J.1
Altekar, G.2
Maniatis, P.3
Chun, B.-G.4
-
25
-
-
85076920858
-
A VMM security kernel for the VAX architecture
-
P. A. Karger, M. E. Zurko, D. W. Benin, A. H. Mason, and C. E. Kahn. A VMM security kernel for the VAX architecture. In S&P, 1990.
-
(1990)
S&P
-
-
Karger, P.A.1
Zurko, M.E.2
Benin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
26
-
-
77954969841
-
Nohype: Virtualized cloud infrastructure without the virtualization
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: Virtualized cloud infrastructure without the virtualization. In ISCA, 2010.
-
(2010)
ISCA
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
27
-
-
77956335911
-
Usable security: How to get it
-
Nov
-
B. Lampson. Usable security: How to get it. Communications of the ACM, 52(11), Nov. 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
-
-
Lampson, B.1
-
29
-
-
77249114232
-
An efficient secure deletion scheme for flash file systems
-
J. Lee, S. Yi, J. Heo, H. Park, S. Y. Shin, and Y. Cho. An efficient secure deletion scheme for flash file systems. Journal of Information Science and Engineering, 2010.
-
(2010)
Journal of Information Science and Engineering
-
-
Lee, J.1
Yi, S.2
Heo, J.3
Park, H.4
Shin, S.Y.5
Cho, Y.6
-
31
-
-
84888986199
-
Do you know where your data are? Secure data capsules for deployable data protection
-
P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do you know where your data are? Secure data capsules for deployable data protection. In HotOS, 2011.
-
(2011)
HotOS
-
-
Maniatis, P.1
Akhawe, D.2
Fall, K.3
Shi, E.4
McCamant, S.5
Song, D.6
-
32
-
-
80755187832
-
Unicorn: Two-factor attestation for data security
-
M. Mannan, B. H. Kim, A. Ganjali, and D. Lie. Unicorn: Two-factor attestation for data security. In CCS, 2011.
-
(2011)
CCS
-
-
Mannan, M.1
Kim, B.H.2
Ganjali, A.3
Lie, D.4
-
33
-
-
34748840535
-
STEGFs: A steganographic file system for Linux
-
A. McDonald and M. Kuhn. StegFS: A steganographic file system for Linux. In IH, 1999.
-
(1999)
IH
-
-
McDonald, A.1
Kuhn, M.2
-
36
-
-
0345359164
-
STEGFs: A steganographic file system
-
H. Pang, K.-L. Tan, and X. Zhou. StegFS: A steganographic file system. In ICDE, 2003.
-
(2003)
ICDE
-
-
Pang, H.1
Tan, K.-L.2
Zhou, X.3
-
39
-
-
84874283560
-
Secure deletion for a versioning file system
-
Z. Peterson, R. Burns, J. Herring, A. Stubblefield, and A. Rubin. Secure deletion for a versioning file system. In FAST, 2005.
-
(2005)
FAST
-
-
Peterson, Z.1
Burns, R.2
Herring, J.3
Stubblefield, A.4
Rubin, A.5
-
42
-
-
85084160194
-
Encrypting virtual memory
-
N. Provos. Encrypting virtual memory. In USENIX Security, 2000.
-
(2000)
USENIX Security
-
-
Provos, N.1
-
43
-
-
85076916746
-
-
Qubes. http://qubes-os.org/.
-
-
-
-
44
-
-
85073529809
-
Data node encrypted file system: Efficient secure deletion for flash memory
-
J. Reardon, S. Capkun, and D. Basin. Data node encrypted file system: Efficient secure deletion for flash memory. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Reardon, J.1
Capkun, S.2
Basin, D.3
-
46
-
-
35448997405
-
Threats to privacy in the forensic analysis of database systems
-
P. Stahlberg, G. Miklau, and B. Levine. Threats to privacy in the forensic analysis of database systems. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Stahlberg, P.1
Miklau, G.2
Levine, B.3
-
47
-
-
84904654800
-
SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes
-
K. Sun, J. Wang, F. Zhang, and A. Stavrou. SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes. In NDSS, 2012.
-
(2012)
NDSS
-
-
Sun, K.1
Wang, J.2
Zhang, F.3
Stavrou, A.4
-
48
-
-
0036086129
-
Statistical identification of encrypted Web browsing traffic
-
Q. Sun, D. Simon, Y.-M. Wang, W. Russell, V. Padmanabhan, and L. Qiu. Statistical identification of encrypted Web browsing traffic. In S&P, 2002.
-
(2002)
S&P
-
-
Sun, Q.1
Simon, D.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.5
Qiu, L.6
-
50
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
J. Szefer, E. Keller, R. B. Lee, and J. Rexford. Eliminating the hypervisor attack surface for a more secure cloud. In CCS, 2011.
-
(2011)
CCS
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
51
-
-
84857516359
-
Trust and protection in the Illinois browser operating system
-
S. Tang, H. Mai, and S. T. King. Trust and protection in the Illinois browser operating system. In OSDI, 2010.
-
(2010)
OSDI
-
-
Tang, S.1
Mai, H.2
King, S.T.3
-
52
-
-
84889034552
-
Cleanos: Limiting mobile data exposure with idle eviction
-
Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: Limiting mobile data exposure with idle eviction. In OSDI, 2012.
-
(2012)
OSDI
-
-
Tang, Y.1
Ames, P.2
Bhamidipati, S.3
Bijlani, A.4
Geambasu, R.5
Sarda, N.6
-
53
-
-
85076883014
-
-
Tor. http://www.torproject.org.
-
-
-
-
54
-
-
85076929332
-
-
Retrieved on 5/3/12
-
SwapFaq. https://help.ubuntu.com/community/ SwapFaq. Retrieved on 5/3/12.
-
SwapFaq
-
-
-
55
-
-
80755186325
-
-
Technical Report CMU-CyLab-09-011, CMU
-
A. Vasudevan, B. Parno, N. Qu, and A. Perrig. Lockdown: A safe and practical environment for security applications. Technical Report CMU-CyLab-09-011, CMU, 2009.
-
(2009)
Lockdown: A Safe and Practical Environment for Security Applications
-
-
Vasudevan, A.1
Parno, B.2
Qu, N.3
Perrig, A.4
-
57
-
-
85021672500
-
Reliably erasing data from flash-based solid state drives
-
M. Wei, L. Grupp, F. Spada, and S. Swanson. Reliably erasing data from flash-based solid state drives. In FAST, 2011.
-
(2011)
FAST
-
-
Wei, M.1
Grupp, L.2
Spada, F.3
Swanson, S.4
-
59
-
-
84991934426
-
Tightlip: Keeping applications from spilling the beans
-
A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In NSDI, 2007.
-
(2007)
NSDI
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, L.P.3
|