-
2
-
-
79959471871
-
Eight million people at risk of ID fraud after credit card details are stolen by hotel chain hackers
-
(UK) August 25
-
Bates, D.: Eight million people at risk of ID fraud after credit card details are stolen by hotel chain hackers. (UK) Daily Mail (August 25, 2008)
-
(2008)
Daily Mail
-
-
Bates, D.1
-
3
-
-
79959433383
-
Britain's MI5: Chinese cyberattacks target top companies
-
December 3
-
Blakely, R., Richards, J., Rossiter, J., Beeston, R.: Britain's MI5: Chinese cyberattacks target top companies. The Times of London (December 3, 2007)
-
(2007)
The Times of London
-
-
Blakely, R.1
Richards, J.2
Rossiter, J.3
Beeston, R.4
-
4
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In: Proc. of the 13th Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS (2008)
-
Proc. of the 13th Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS (2008)
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
5
-
-
42549167254
-
Hardware-rooted trust for secure key management and transient trust
-
ACM, New York
-
Dwoskin, J.S., Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 389-400. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007
, pp. 389-400
-
-
Dwoskin, J.S.1
Lee, R.B.2
-
6
-
-
0030149547
-
Software protection and simulation on Oblivious RAM
-
ACM
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on Oblivious RAM. Journal of the ACM 43(3), 431-473 (1996)
-
(1996)
Journal of the
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
7
-
-
33646015987
-
Synergistic processing in cell's multicore architecture
-
Gschwind, M., Hofstee, H.P., Flachs, B., Hopkins, M., Watanabe, Y., Yamazaki, T.: Synergistic processing in cell's multicore architecture. IEEE Micro. 26, 10-24 (2006)
-
(2006)
IEEE Micro.
, vol.26
, pp. 10-24
-
-
Gschwind, M.1
Hofstee, H.P.2
Flachs, B.3
Hopkins, M.4
Watanabe, Y.5
Yamazaki, T.6
-
9
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
IEEE Computer Society, Washington, DC
-
Lee, R.B., Kwan, P.C.S., McGregor, J.P., Dwoskin, J., Wang, Z.: Architecture for protecting critical secrets in microprocessors. In: Proceedings of the 32nd Annual International Symposium on Computer Architecture, ISCA 2005, pp. 2-13. IEEE Computer Society, Washington, DC (2005)
-
(2005)
Proceedings of the 32nd Annual International Symposium on Computer Architecture, ISCA 2005
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
10
-
-
27544437127
-
-
PhD thesis, Stanford, CA, USA. Adviser-Horowitz, Mark
-
Lie, D.J.: Architectural support for copy and tamper-resistant software. PhD thesis, Stanford, CA, USA. Adviser-Horowitz, Mark (2004)
-
(2004)
Architectural Support for Copy and Tamper-resistant Software
-
-
Lie, D.J.1
-
11
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An execution infrastructure for TCB minimization. In: Proceedings of the ACM European Conference on Computer Systems(EUROSYS) (2008)
-
Proceedings of the ACM European Conference on Computer Systems(EUROSYS) (2008)
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
13
-
-
1142280988
-
-
ACM Press, New York
-
Edward Suh, G., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Aegis: Architecture for tamper-evident and tamper-resistant processing, pp. 160-171. ACM Press, New York (2003)
-
(2003)
Aegis: Architecture for Tamper-evident and Tamper-resistant Processing
, pp. 160-171
-
-
Edward Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
|