-
1
-
-
85080544297
-
-
Performance Measurement on ARM. http: //www.pengutronix.de/development/kernel/ arm-benchmarks-20100729-en.html.
-
Performance Measurement on ARM.
-
-
-
4
-
-
85080513184
-
Primecell infrastructure amba3 trustzone memory adapter (bp141)
-
ARM.
-
ARM. Primecell infrastructure amba3 trustzone memory adapter (bp141). In ARM DTO 0017A (2004).
-
(2004)
ARM DTO 0017A
-
-
-
9
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
-
AZAB, A. M., NING, P., SHAH, J., CHEN, Q., BHUTKAR, R., GANESH, G., MA, J., AND SHEN, W. Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014).
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
12
-
-
77957766305
-
Accelerating two-dimensional page walks for virtualized systems
-
BHARGAVA, R., SEREBRIN, B., SPADINI, F., AND MANNE, S. Accelerating two-dimensional page walks for virtualized systems. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (2008).
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Bhargava, R.1
Serebrin, B.2
Spadini, F.3
Manne, S.4
-
13
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
BICKFORD, J., O'HARE, R., BALIGA, A., GANAPATHY, V., AND IFTODE, L. Rootkits on smart phones: attacks, implications and opportunities. In Proceedings of the eleventh workshop on mobile computing systems & applications (2010).
-
(2010)
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
14
-
-
85084162921
-
Privtrans: Automatically partitioning programs for privilege separation
-
BRUMLEY, D., AND SONG, D. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Symposium (2004).
-
(2004)
USENIX Security Symposium
-
-
Brumley, D.1
Song, D.2
-
17
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
CHEN, X., GARFINKEL, T., LEWIS, E. C., SUBRAHMANYAM, P., WALDSPURGER, C. A., BONEH, D., DWOSKIN, J., AND PORTS, D. R. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (2008).
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
18
-
-
84906502672
-
-
Singaport Management University Technical Report, SMU-SIS-13
-
CHENG, Y., DING, X., AND DENG, R. Appshield: Protecting applications against untrusted operating system. Singaport Management University Technical Report, SMU-SIS-13 (2013).
-
(2013)
Appshield: Protecting Applications Against Untrusted Operating System.
-
-
Cheng, Y.1
Ding, X.2
Deng, R.3
-
19
-
-
79959617325
-
Secureme: A hardware-software approach to full system security
-
CHHABRA, S., ROGERS, B., SOLIHIN, Y., AND PRVULOVIC, M. Secureme: a hardware-software approach to full system security. In Proceedings of the international conference on Supercomputing (2011).
-
(2011)
Proceedings of the International Conference on Supercomputing
-
-
Chhabra, S.1
Rogers, B.2
Solihin, Y.3
Prvulovic, M.4
-
20
-
-
84939190257
-
Protecting data on smartphones and tablets from memory attacks
-
COLP, P. J., ZHANG, J., GLEESON, J., SUNEJA, S., DE LARA, E., RAJ, H., SAROIU, S., AND WOLMAN, A. Protecting data on smartphones and tablets from memory attacks. In Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2015).
-
(2015)
Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Colp, P.J.1
Zhang, J.2
Gleeson, J.3
Suneja, S.4
De Lara, E.5
Raj, H.6
Saroiu, S.7
Wolman, A.8
-
23
-
-
84950126617
-
-
DEVRIENT, G. Mobicore. http://www. gi-de.com/en/trends-and-insights/mobicore/ trusted-mobile-services.jsp.
-
Mobicore
-
-
Devrient, G.1
-
24
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (2003).
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
26
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
HALDERMAN, J. A., SCHOEN, S. D., HENINGER, N., CLARKSON, W., PAUL, W., CALANDRINO, J. A., FELDMAN, A. J., APPELBAUM, J., AND FELTEN, E. W. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th Conference on Security Symposium (2008).
-
(2008)
Proceedings of the 17th Conference on Security Symposium
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
27
-
-
85080603602
-
-
HARDKERNEL. Odroid. http://www.hardkernel.com.
-
Odroid
-
-
-
28
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
HOFMANN, O. S., KIM, S., DUNN, A. M., LEE, M. Z., AND WITCHEL, E. Inktag: Secure applications on an untrusted operating system. In Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2013).
-
(2013)
Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
31
-
-
84890655093
-
-
LABS, M. Threats report. http://www.mcafee.com/us/ resources/reports/rp-quarterly-threat-q1-2015. pdf, 2015.
-
(2015)
Threats Report.
-
-
Labs, M.1
-
32
-
-
84906872126
-
Building trusted path on untrusted device drivers for mobile devices
-
LI, W., MA, M., HAN, J., XIA, Y., ZANG, B., CHU, C.-K., AND LI, T. Building trusted path on untrusted device drivers for mobile devices. In Proceedings of 5th Asia-Pacific Workshop on Systems (2014).
-
(2014)
Proceedings of 5th Asia-Pacific Workshop on Systems
-
-
Li, W.1
Ma, M.2
Han, J.3
Xia, Y.4
Zang, B.5
Chu, C.-K.6
Li, T.7
-
33
-
-
85077468673
-
Minibox: A two-way sandbox for x86 native code
-
LI, Y., MCCUNE, J., NEWSOME, J., PERRIG, A., BAKER, B., AND DREWRY, W. Minibox: A two-way sandbox for x86 native code. In 2014 USENIX Annual Technical Conference (ATC) (2014).
-
(2014)
2014 USENIX Annual Technical Conference (ATC)
-
-
Li, Y.1
McCune, J.2
Newsome, J.3
Perrig, A.4
Baker, B.5
Drewry, W.6
-
35
-
-
12844273420
-
Devirtualizable virtual machines enabling general, single-node, online maintenance
-
LOWELL, D. E., SAITO, Y., AND SAMBERG, E. J. Devirtualizable virtual machines enabling general, single-node, online maintenance. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (2004).
-
(2004)
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Lowell, D.E.1
Saito, Y.2
Samberg, E.J.3
-
36
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
MCCUNE, J. M., LI, Y., QU, N., ZHOU, Z., DATTA, A., GLIGOR, V., AND PERRIG, A. Trustvisor: Efficient tcb reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (2010).
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
37
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
MCCUNE, J. M., PARNO, B., PERRIG, A., REITER, M. K., AND ISOZAKI, H. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the ACM European Conference in Computer Systems (2008).
-
(2008)
Proceedings of the ACM European Conference in Computer Systems
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
38
-
-
84869238509
-
Relationships between selected software measures and latent bug-density: Guidelines for improving quality
-
MISRA, S. C., AND BHAVSAR, V. C. Relationships between selected software measures and latent bug-density: Guidelines for improving quality. In Computational Science and Its ApplicationsICCSA 2003. 2003.
-
(2003)
Computational Science and Its Applications ICCSA 2003
-
-
Misra, S.C.1
Bhavsar, V.C.2
-
39
-
-
33846483949
-
Intel virtualization technology: Hardware support for efficient processor virtualization
-
NEIGER, G., SANTONI, A., LEUNG, F., RODGERS, D., AND UHLIG, R. Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal (2006).
-
(2006)
Intel Technology Journal
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
40
-
-
84958594618
-
Xnpro: Low-impact hypervisor-based execution prevention on arm
-
NORDHOLZ, J., VETTER, J., PETER, M., JUNKERPETSCHICK, M., AND DANISEVSKIS, J. Xnpro: Low-impact hypervisor-based execution prevention on arm. In Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (2015).
-
(2015)
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices
-
-
Nordholz, J.1
Vetter, J.2
Peter, M.3
Junkerpetschick, M.4
Danisevskis, J.5
-
43
-
-
84950288948
-
Appsec: A safe execution environment for security sensitive applications
-
REN, J., QI, Y., DAI, Y., WANG, X., AND SHI, Y. Appsec: A safe execution environment for security sensitive applications. In Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (2015).
-
(2015)
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
-
-
Ren, J.1
Qi, Y.2
Dai, Y.3
Wang, X.4
Shi, Y.5
-
44
-
-
84860709376
-
Trusted language runtime (tlr): Enabling trusted applications on smartphones
-
SANTOS, N., RAJ, H., SAROIU, S., AND WOLMAN, A. Trusted language runtime (tlr): enabling trusted applications on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (2011).
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
45
-
-
84897768729
-
Using arm trustzone to build a trusted language runtime for mobile applications
-
SANTOS, N., RAJ, H., SAROIU, S., AND WOLMAN, A. Using arm trustzone to build a trusted language runtime for mobile applications. In Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2014).
-
(2014)
Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
46
-
-
84945188553
-
Vc3: Trustworthy data analytics in the cloud using sgx
-
SCHUSTER, F., COSTA, M., FOURNET, C., GKANTSIDIS, C., PEINADO, M., MAINAR-RUIZ, G., AND RUSSINOVICH, M. Vc3: Trustworthy data analytics in the cloud using sgx. In Security and Privacy (SP), 2015 IEEE Symposium on (2015).
-
(2015)
Security and Privacy (SP), 2015 IEEE Symposium on
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
47
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
SESHADRI, A., LUK, M., QU, N., AND PERRIG, A. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles (2007).
-
(2007)
Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
50
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamperresistant processing
-
SUH, G. E., CLARKE, D., GASSEND, B., VAN DIJK, M., AND DEVADAS, S. Aegis: architecture for tamper-evident and tamperresistant processing. In Proceedings of the 17th annual international conference on Supercomputing (2003).
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
51
-
-
84954087999
-
Trustotp: Transforming smartphones into secure one-time password tokens
-
SUN, H., SUN, K., WANG, Y., AND JING, J. Trustotp: Transforming smartphones into secure one-time password tokens. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015).
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
-
52
-
-
84950138855
-
Trustice: Hardware-assisted isolated computing environments on mobile devices
-
SUN, H., SUN, K., WANG, Y., JING, J., AND WANG, H. Trustice: Hardware-assisted isolated computing environments on mobile devices. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on (2015).
-
(2015)
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
Wang, H.5
-
53
-
-
84904654800
-
Secureswitch: Bios-assisted isolation and switch between trusted and untrusted commodity oses
-
SUN, K., WANG, J., ZHANG, F., AND STAVROU, A. Secureswitch: Bios-assisted isolation and switch between trusted and untrusted commodity oses. In Network and Distributed System Security Symposium (NDSS) (2012).
-
(2012)
Network and Distributed System Security Symposium (NDSS)
-
-
Sun, K.1
Wang, J.2
Zhang, F.3
Stavrou, A.4
-
54
-
-
85080494445
-
-
SYSTEM, F. Ddr2 800 bus analysis probe. http://www. futureplus.com/download/datasheet/fs2334-ds.pdf, 2006.
-
(2006)
800 Bus Analysis Probe.
-
-
-
57
-
-
85080470386
-
-
Sloccount.
-
WHEELER, D. A. Sloccount. http://www.dwheeler.com/ sloccount, 2001.
-
(2001)
-
-
Wheeler, D.A.1
-
59
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J. B., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native client: A sandbox for portable, untrusted x86 native code. In Proceedings of the 30th IEEE Symposium on Security and Privacy (2009).
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|