-
1
-
-
33646767376
-
CFI: Principles, implementations, and applications
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. CFI: Principles, Implementations, and Applications. In Proceedings of ACM Conference and Computer and Communications Security (2005).
-
(2005)
Proceedings of ACM Conference and Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
72449145808
-
Control-flow integrity principles, implementation, and applications
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-Flow Integrity Principles, Implementation, and Applications. ACM Transaction on Information and System Security (2009), 1 - 40.
-
(2009)
ACM Transaction on Information and System Security
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
33750410092
-
A theory of secure control flow
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. A theory of secure control flow. In Proceedings of Conference on Formal Engineering Methods (2005).
-
(2005)
Proceedings of Conference on Formal Engineering Methods
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
84897781978
-
Innovative technology for CPU based attestation and sealing
-
ABATU, U., GUERON, S., JOHNSON, S. P., AND SCARLATA, V. R. Innovative technology for CPU based attestation and sealing. In Proceedings of International Workshop on Hardware and Architectural Support for Security and Privacy (2013).
-
(2013)
Proceedings of International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
Abatu, U.1
Gueron, S.2
Johnson, S.P.3
Scarlata, V.R.4
-
7
-
-
21644433634
-
Xen and the art of virtualization
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the art of virtualization. In Proceedings of Symposium on Operating Systems Principles (2003).
-
(2003)
Proceedings of Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
85077440767
-
-
BAUMANN, A., PEINADO, M., HUNT, G., ZMUDZINSKI, K., ROZAS, C. V., AND HOEKSTRA, M. Secure execution of unmodified applications on an untrusted host. http://research.microsoft.com/apps/pubs/default.aspx?id=204758, 2013.
-
(2013)
Secure Execution of Unmodified Applications on an Untrusted Host
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
Zmudzinski, K.4
Rozas, C.V.5
Hoekstra, M.6
-
10
-
-
85092890026
-
Certifying program execution with secure processors
-
CHEN, B., AND MORRIS, R. Certifying program execution with secure processors. In Proceedings of HotOS (2003).
-
(2003)
Proceedings of HotOS
-
-
Chen, B.1
Morris, R.2
-
11
-
-
58049139900
-
Tamper-resistant execution in an untrusted operating system using a VMM
-
Fudan University
-
CHEN, H., ZHANG, F., CHEN, C., YANG, Z., CHEN, R., ZANG, B., YEW, P., AND MAO, W. Tamper-resistant execution in an untrusted operating system using a VMM. Tech. Rep. FDUPPITR-2007-0801, Fudan University, 2007.
-
(2007)
Tech. Rep. FDUPPITR-2007-0801
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Yang, Z.4
Chen, R.5
Zang, B.6
Yew, P.7
Mao, W.8
-
12
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
CHEN, X., GARFINKEL, T., LEWIS, E. C., SUBRAHMANYAM, P., WALDSPURGER, C. A., BONEH, D., DWOSKIN, J., AND PORTS, D. R. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems (2008).
-
(2008)
Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
15
-
-
70249085218
-
A hypervisor-based system for protecting software runtime memory and persistent storage
-
DEWAN, P., DURHAM, D., KHOSRAVI, H., LONG, M., AND NAGABHUSHAN, G. A hypervisor-based system for protecting software runtime memory and persistent storage. In Proceedings of Spring Simulation Multiconference (2008).
-
(2008)
Proceedings of Spring Simulation Multiconference
-
-
Dewan, P.1
Durham, D.2
Khosravi, H.3
Long, M.4
Nagabhushan, G.5
-
16
-
-
85076904874
-
Leveraging legacy code to deploy desktop applications on the web
-
DOUCEUR, J. R., ELSON, J., HOWELL, J., AND LORCH, J. R. Leveraging legacy code to deploy desktop applications on the web. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (2008).
-
(2008)
Proceedings of USENIX Symposium on Operating Systems Design and Implementation
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
17
-
-
84977837849
-
Innovative instructions and software model for isolated execution
-
FRANK, M., ILYA, A., ALEX, B., V, R. C., HISHAM, S., VEDVYAS, S., AND R, S. U. Innovative instructions and software model for isolated execution. In Proceedings of International Workshop on Hardware and Architectural Support for Security and Privacy (2013).
-
(2013)
Proceedings of International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
Frank, M.1
Ilya, A.2
Alex, B.3
Hisham, S.4
Vedvyas, S.5
-
18
-
-
21644455412
-
TerrA: A virtual machine-based platform for trusted computing
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. Terra: A virtual machine-based platform for trusted computing. In Proceedings of ACM Symposium on Operating System Principles (2003).
-
(2003)
Proceedings of ACM Symposium on Operating System Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
19
-
-
85061457056
-
-
G O N G, L. Java 2 Platform Security Architecture. http://docs.oracle.com/javase/6/docs/technotes/guides/security/spec/security- spec.doc.html.
-
Platform Security Architecture
-
-
Java, L.1
-
20
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
HOEKSTRA, M., LAL, R., PAPPACHAN, P., PHEGADE, V., AND DEL CUVILLO, J. Using innovative instructions to create trustworthy software solutions. In Proceedings of International Workshop on Hardware and Architectural Support for Security and Privacy (2013).
-
(2013)
Proceedings of International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
21
-
-
84875683130
-
InkTag: Secure applications on an untrusted operating system
-
HOFMANN, O., DUNN, A., KIM, S., LEE, M., AND WITCHEL, E. InkTag: Secure applications on an untrusted operating system. In Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems (2013).
-
(2013)
Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Hofmann, O.1
Dunn, A.2
Kim, S.3
Lee, M.4
Witchel, E.5
-
23
-
-
80051954621
-
Txbox: Building secure, efficient sandboxes with system transactions
-
JANA, S., PORTER, D. E., AND SHMATIKOV, V. TxBox: Building secure, efficient sandboxes with system transactions. In Proceedings of IEEE Symposium on Security and Privacy (2011)
-
(2011)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Jana, S.1
Porter, D.E.2
Shmatikov, V.3
-
26
-
-
84940997196
-
-
Tech. Rep. CMU-CyLab-14-001, Carnegie Mellon University
-
LI, Y., PERRIG, A., MCCUNE, J. M., NEWSOME, J., BAKER, B., AND DREWRY, W. MiniBox: A Two-Way Sandbox for x86 Native Code. Tech. Rep. CMU-CyLab-14-001, Carnegie Mellon University, 2014.
-
(2014)
MiniBox: A Two-Way Sandbox for X86 Native Code
-
-
Li, Y.1
Perrig, A.2
McCune, J.M.3
Newsome, J.4
Baker, B.5
Drewry, W.6
-
29
-
-
84971564674
-
Verifying security invariants in expressOS
-
MAI, H., PEK, E., XUE, H., KING, S. T., AND MADHUSUDAN, P. Verifying security invariants in expressOS. In Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems (2013).
-
(2013)
Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Mai, H.1
Pek, E.2
Xue, H.3
King, S.T.4
Madhusudan, P.5
-
31
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
MCCUNE, J. M., LI, Y., QU, N., ZHOU, Z., DATTA, A., GLIGOR, V., AND PERRIG, A. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of IEEE Symposium on Security and Privacy (2010).
-
(2010)
Proceedings of IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
32
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
MCCUNE, J. M., PARNO, B., PERRIG, A., REITER, M. K., AND ISOZAKI, H. Flicker: An execution infrastructure for TCB minimization. In Proceedings of European Conference on Computer Systems (2008).
-
(2008)
Proceedings of European Conference on Computer Systems
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
34
-
-
84881239409
-
Privexec: Private execution as an operating system service
-
ONARLIOGLU, K., MULLINER, C., ROBERTSON, W., AND KIRDA, E. PrivExec: Private execution as an operating system service. In Proceedings of IEEE Symposium on Security and Privacy (2013).
-
(2013)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Onarlioglu, K.1
Mulliner, C.2
Robertson, W.3
Kirda, E.4
-
35
-
-
85077435119
-
-
May
-
OPENSSL PROJECT TEAM. OpenSSL. http://www.openssl.org/, May 2005.
-
(2005)
OpenSSL
-
-
-
36
-
-
84863835377
-
Rethinking the library OS from the top down
-
Mar
-
PORTER, D. E., BOYD-WICKIZER, S., HOWELL, J., OLINSKY, R., AND HUNT, G. C. Rethinking the library OS from the top down. SIGPLAN Not. 46, 3 (Mar. 2011), 291-304.
-
(2011)
SIGPLAN Not
, vol.46
, Issue.3
, pp. 291-304
-
-
Porter, D.E.1
Boyd-Wickizer, S.2
Howell, J.3
Olinsky, R.4
Hunt, G.C.5
-
38
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications
-
SINGARAVELU, L., PU, C., HÄRTIG, H., AND HELMUTH, C. Reducing TCB complexity for security-sensitive applications. In Proceedings of European Conference on Computer Systems (2006).
-
(2006)
Proceedings of European Conference on Computer Systems
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
39
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Apr
-
SMITH, S. W., AND WEINGART, S. Building a high-performance, programmable secure coprocessor. Computer Networks 31, 8 (Apr. 1999).
-
(1999)
Computer Networks
, vol.31
, pp. 8
-
-
Smith, S.W.1
Weingart, S.2
-
41
-
-
84881219022
-
Design, implementation and verification of an extensible and modular hypervisor framework
-
VASUDEVAN, A., CHAKI, S., JIA, L., MCCUNE, J., NEWSOME, J., AND DATTA, A. Design, implementation and verification of an extensible and modular hypervisor framework. In Proceedings of IEEE Symposium on Security and Privacy (2013).
-
(2013)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Vasudevan, A.1
Chaki, S.2
Jia, L.3
McCune, J.4
Newsome, J.5
Datta, A.6
-
42
-
-
0027836576
-
Efficient software-based fault isolation
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. Efficient software-based fault isolation. In Proceedings of ACM Symposium on Operating Systems Principles (1993).
-
(1993)
Proceedings of ACM Symposium on Operating Systems Principles
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
44
-
-
85067179564
-
Capsicum: Practical capabilities for unix
-
WATSON, R. N. M., ANDERSON, J., LAURIE, B., AND KENNAWAY, K. Capsicum: Practical capabilities for unix. In Proceedings of USENIX Security Symposium (2010).
-
(2010)
Proceedings of USENIX Security Symposium
-
-
Watson, R.N.M.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
46
-
-
85077057397
-
JVPFS: Adding robustness to a secure stacked file system with untrusted local storage components
-
WEINHOLD, C., AND HÄRTIG, H. jVPFS: adding robustness to a secure stacked file system with untrusted local storage components. In Proceedings of USENIX Annual Technical Conference (2011).
-
(2011)
Proceedings of USENIX Annual Technical Conference
-
-
Weinhold, C.1
Härtig, H.2
-
48
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J. B., MUTH, R., ORMANDY T., OKASAKA, S., NARULA, N., FULLAGAR, N., AND GOOGLE INC. Native Client: A sandbox for portable, untrusted x86 native code. In Proceedings of IEEE Symposium on Security and Privacy (2009).
-
(2009)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
Google, I.N.C.10
-
49
-
-
73649126934
-
Native client: A sandbox for portable, untrusted x86 native code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J. B., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native Client: A sandbox for portable, untrusted x86 native code. Communications of the ACM 53, 1 (2010), 91-99.
-
(2010)
Communications of the ACM
, vol.53
, Issue.1
, pp. 91-99
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
50
-
-
82655179240
-
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
ZHANG, F., CHEN, J., CHEN, H., AND ZANG, B. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proceedings of ACM Symposium on Operating Systems Principles (2011).
-
(2011)
Proceedings of ACM Symposium on Operating Systems Principles
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
-
51
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
ZHANG, Y., JUELS, A., REITER, M. K., AND RISTENPART, T. Cross-VM side channels and their use to extract private keys. In Proceedings of ACM Conference on Computer and Communications Security (2012).
-
(2012)
Proceedings of ACM Conference on Computer and Communications Security
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|