-
1
-
-
84947089277
-
Architecture reference manual (armv7-a and armv7-r edition)
-
“Architecture reference manual (armv7-a and armv7-r edition), ” ARM DDI C, vol. 406, 2008.
-
(2008)
ARM DDI C
, vol.406
-
-
-
2
-
-
85162730360
-
-
April [Online]. Available
-
“cve-2013-3051, ” April 2013. [Online]. Available: http://www.cvedetails.com/cve/CVE-2013-3051/
-
(2013)
cve-2013-3051
-
-
-
3
-
-
84912100809
-
-
April [Online]. Available
-
“Unlocking the motorola bootloader, ” April 2013. [Online]. Available: http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html
-
(2013)
Unlocking the motorola bootloader
-
-
-
4
-
-
85180547617
-
-
June [Online]. Available
-
“Arm fastmodels, ” June 2014. [Online]. Available: http://www.arm.com/products/tools/models/fast-models/
-
(2014)
Arm fastmodels
-
-
-
6
-
-
85180553092
-
-
June [Online]. Available
-
“Arndale board, ” June 2014. [Online]. Available: http://www.arndaleboard.org/wiki/index.php/Main_Page
-
(2014)
Arndale board
-
-
-
7
-
-
85180549310
-
-
June [Online]. Available
-
“Discretix, ” June 2014. [Online]. Available: http://www.discretix.com/products-solutions
-
(2014)
Discretix
-
-
-
8
-
-
85180552693
-
-
Tech. Rep., June [Online]. Available
-
“Model debugger for fast models, ” Tech. Rep., June 2014. [Online]. Available: http://infocenter.arm.com/help/topic/com.arm.doc.dui0314i/DUI0314I_model_debugger_ug.pdf
-
(2014)
Model debugger for fast models
-
-
-
9
-
-
85180550119
-
-
June [Online]. Available
-
“Proxama, ” June 2014. [Online]. Available: http://www.proxama.com/products-and-services/trustzone
-
(2014)
Proxama
-
-
-
10
-
-
85180545731
-
-
June [Online]. Available
-
“Sensepost, ” June 2014. [Online]. Available: http://www.sensepost.com/blog/9114.html
-
(2014)
Sensepost
-
-
-
11
-
-
85180555329
-
-
June [Online]. Available
-
“Sierraware, ” June 2014. [Online]. Available: http://www.openvirtualization.org/
-
(2014)
Sierraware
-
-
-
12
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith, “A secure and reliable bootstrap architecture, ” in Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on. IEEE, 1997, pp. 65-71.
-
(1997)
Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on
, pp. 65-71
-
-
Arbaugh, W. A.1
Farber, D. J.2
Smith, J. M.3
-
13
-
-
85180549224
-
-
ARM, Tech. Rep., November [Online]. Available
-
ARM, “Procedure call standard for the arm architecture, ” Tech. Rep., November 2012. [Online]. Available: http://infocenter.arm.com/help/topic/com.arm.doc.ihi0042e/IHI0042E_aapcs.pdf
-
(2012)
Procedure call standard for the arm architecture
-
-
-
14
-
-
84910623833
-
-
Patent WO 2014/021 919, June 2, [Online]. Available
-
A. AZAB and P. Ning, “Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices, ” Patent WO 2014/021 919, June 2, 2014. [Online]. Available: http://patentscope.wipo.int/search/en/WO2014021919
-
(2014)
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
-
-
AZAB, A.1
Ning, P.2
-
15
-
-
78650019783
-
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
-
ACM
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, “Hypersentry: enabling stealthy in-context measurement of hypervisor integrity, ” in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 38-49.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security
, pp. 38-49
-
-
Azab, A. M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N. C.6
-
16
-
-
77957810674
-
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
-
ACM
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Wald-spurger, D. Boneh, J. Dwoskin, and D. R. Ports, “Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, ” in ACM SIGOPS Operating Systems Review, vol. 42, no. 2. ACM, 2008, pp. 2-13.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.2
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E. C.3
Subrahmanyam, P.4
Wald-spurger, C. A.5
Boneh, D.6
Dwoskin, J.7
Ports, D. R.8
-
17
-
-
84897782769
-
Virtual ghost: protecting applications from hostile operating systems
-
ACM
-
J. Criswell, N. Dautenhahn, and V. Adve, “Virtual ghost: protecting applications from hostile operating systems, ” in Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, 2014, pp. 81-96.
-
(2014)
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems
, pp. 81-96
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
18
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
IEEE
-
Y. Fu and Z. Lin, “Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection, ” in Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012, pp. 586-600.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 586-600
-
-
Fu, Y.1
Lin, Z.2
-
20
-
-
84880127993
-
Inktag: secure applications on an untrusted operating system
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel, “Inktag: secure applications on an untrusted operating system, ” ACM SIGPLAN Notices, vol. 48, no. 4, pp. 265-278, 2013.
-
(2013)
ACM SIGPLAN Notices
, vol.48
, Issue.4
, pp. 265-278
-
-
Hofmann, O. S.1
Kim, S.2
Dunn, A. M.3
Lee, M. Z.4
Witchel, E.5
-
21
-
-
84858790227
-
Architectural support for secure virtualization under a vulnerable hypervisor
-
ACM
-
S. Jin, J. Ahn, S. Cha, and J. Huh, “Architectural support for secure virtualization under a vulnerable hypervisor, ” in Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture. ACM, 2011, pp. 272-283.
-
(2011)
Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 272-283
-
-
Jin, S.1
Ahn, J.2
Cha, S.3
Huh, J.4
-
22
-
-
17544370316
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz, “Architectural support for copy and tamper resistant software, ” ACM SIGPLAN Notices, vol. 35, no. 11, pp. 168-177, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
23
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
ACM
-
D. Lie, C. A. Thekkath, and M. Horowitz, “Implementing an untrusted operating system on trusted hardware, ” in ACM SIGOPS Operating Systems Review, vol. 37, no. 5. ACM, 2003, pp. 178-192.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.5
, pp. 178-192
-
-
Lie, D.1
Thekkath, C. A.2
Horowitz, M.3
-
24
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie, “Hypervisor support for identifying covertly executing binaries, ” in USENIX Security Symposium, 2008, pp. 243-258.
-
(2008)
USENIX Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H. A.2
Lie, D.3
-
25
-
-
84864334953
-
Software abstractions for trusted sensors
-
ACM
-
H. Liu, S. Saroiu, A. Wolman, and H. Raj, “Software abstractions for trusted sensors, ” in Proceedings of the 10th international conference on Mobile systems, applications, and services. ACM, 2012, pp. 365-378.
-
(2012)
Proceedings of the 10th international conference on Mobile systems, applications, and services
, pp. 365-378
-
-
Liu, H.1
Saroiu, S.2
Wolman, A.3
Raj, H.4
-
26
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar, “Innovative instructions and software model for isolated execution, ” HASP, vol. 13, p. 10, 2013.
-
(2013)
HASP
, vol.13
, pp. 10
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C. V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U. R.7
-
27
-
-
85180548695
-
-
Tech. Rep., June [Online]. Available
-
P. Ning, “Introducing the samsung knox plaform, ” Tech. Rep., June 2014. [Online]. Available: http://samsungdevus.com/sites/Default/files/IntroducingtheSamsungKNOXPlatform-PengNing.pdf
-
(2014)
Introducing the samsung knox plaform
-
-
Ning, P.1
-
28
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
IEEE
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, “Lares: An architecture for secure active monitoring using virtualization, ” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008, pp. 233-247.
-
(2008)
Security and Privacy, 2008. SP 2008. IEEE Symposium on
, pp. 233-247
-
-
Payne, B. D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
29
-
-
77954972405
-
Towards application security on untrusted operating systems
-
D. R. Ports and T. Garfinkel, “Towards application security on untrusted operating systems, ” in HotSec, 2008.
-
(2008)
HotSec
-
-
Ports, D. R.1
Garfinkel, T.2
-
30
-
-
85180553589
-
-
L. Samsung Electronics Co., Tech. Rep., June [Online]. Available
-
L. Samsung Electronics Co., “White paper: An overview of samsung knox, ” Tech. Rep., June 2014. [Online]. Available: http://www.samsung.com/my/business-images/resource/white-paper/2013/11/Samsung_KNOX_whitepaper_An_Overview_of_Samsung_KNOX-0.pdf
-
(2014)
White paper: An overview of samsung knox
-
-
-
31
-
-
84897768729
-
Using arm trustzone to build a trusted language runtime for mobile applications
-
ACM
-
N. Santos, H. Raj, S. Saroiu, and A. Wolman, “Using arm trustzone to build a trusted language runtime for mobile applications, ” in Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, 2014, pp. 67-80.
-
(2014)
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems
, pp. 67-80
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
32
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, “Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses, ” ACM SIGOPS Operating Systems Review, vol. 41, no. 6, pp. 335-350, 2007.
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, Issue.6
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
33
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
ACM
-
M. I. Sharif, W. Lee, W. Cui, and A. Lanzi, “Secure in-vm monitoring using hardware virtualization, ” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 477-487.
-
(2009)
Proceedings of the 16th ACM conference on Computer and communications security
, pp. 477-487
-
-
Sharif, M. I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
34
-
-
80755144012
-
Process out-grafting: an efficient out-of-vm approach for fine-grained process execution monitoring
-
ACM
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu, “Process out-grafting: an efficient out-of-vm approach for fine-grained process execution monitoring, ” in Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011, pp. 363-374.
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security
, pp. 363-374
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
35
-
-
84867864575
-
Efficient monitoring of untrusted kernel-mode execution
-
A. Srivastava and J. T. Giffin, “Efficient monitoring of untrusted kernel-mode execution.” in NDSS, 2011.
-
(2011)
NDSS
-
-
Srivastava, A.1
Giffin, J. T.2
-
36
-
-
78249271707
-
Hypercheck: A hardware-assisted integrity monitor
-
Springer
-
J. Wang, A. Stavrou, and A. Ghosh, “Hypercheck: A hardware-assisted integrity monitor, ” in Recent Advances in Intrusion Detection. Springer, 2010, pp. 158-177.
-
(2010)
Recent Advances in Intrusion Detection
, pp. 158-177
-
-
Wang, J.1
Stavrou, A.2
Ghosh, A.3
-
37
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
ACM
-
Z. Wang, X. Jiang, W. Cui, and P. Ning, “Countering kernel rootkits with lightweight hook protection, ” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 545-554.
-
(2009)
Proceedings of the 16th ACM conference on Computer and communications security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
38
-
-
82655179240
-
Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
ACM
-
F. Zhang, J. Chen, H. Chen, and B. Zang, “Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization, ” in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, 2011, pp. 203-216.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|