-
2
-
-
84897781978
-
Innovative Technology for CPU Based Attestation and Sealing
-
Tel-Aviv, Israel
-
I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), pages 1-8, Tel-Aviv, Israel, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
, pp. 1-8
-
-
Anati, I.1
Gueron, S.2
Johnson, S. P.3
Scarlata, V. R.4
-
4
-
-
80755169488
-
SICE: A hardware-level strongly isolated computing environment for x86 multi-core platforms
-
Chicago, Illinois, Oct
-
A. M. Azab, P. Ning, and X. Zhang. SICE: A hardware-level strongly isolated computing environment for x86 multi-core platforms. In Proceedings of the 18th ACM Conference on Computer and Communications Security, pages 375-388, Chicago, Illinois, Oct. 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Azab, A. M.1
Ning, P.2
Zhang, X.3
-
5
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
Broomfield, Colorado, Oct
-
A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In Proceedings of the 11th Symposium on Operating Systems Design and Implementation (OSDI), pages 267-283, Broomfield, Colorado, Oct. 2014.
-
(2014)
Proceedings of the 11th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 267-283
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
6
-
-
85084096178
-
-
arXiv preprint arXiv:1103.1518
-
S. L. Blond, P. Manils, C. Abdelberi, M. A. D. Kaafar, C. Castelluccia, A. Legout, and W. Dabbous. One bad apple spoils the bunch: exploiting p2p applications to trace and profile tor users. arXiv preprint arXiv:1103.1518, 2011.
-
(2011)
One bad apple spoils the bunch: exploiting p2p applications to trace and profile tor users
-
-
Blond, S. L.1
Manils, P.2
Abdelberi, C.3
Kaafar, M. A. D.4
Castelluccia, C.5
Legout, A.6
Dabbous, W.7
-
8
-
-
84944111596
-
TyTAN: tiny trust anchor for tiny devices
-
F. Brasser, B. E. Mahjoub, A.-R. Sadeghi, C. Wachsmann, and P. Koeberl. TyTAN: tiny trust anchor for tiny devices. In Proceedings of the 52nd Annual Design Automation Conference (DAC), 2015.
-
(2015)
Proceedings of the 52nd Annual Design Automation Conference (DAC)
-
-
Brasser, F.1
Mahjoub, B. E.2
Sadeghi, A.-R.3
Wachsmann, C.4
Koeberl, P.5
-
12
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Seattle, WA, Mar
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 2-13, Seattle, WA, Mar. 2008.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E. C.3
Subrahmanyam, P.4
Waldspurger, C. A.5
Boneh, D.6
Dwoskin, J.7
Ports, D. R.8
-
19
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
Tel-Aviv, Israel
-
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), pages 1-8, Tel-Aviv, Israel, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
, pp. 1-8
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
24
-
-
85180784856
-
-
Intel. June 2015
-
Intel. SGX Tutorial, ISCA 2015. http://sgxisca.weebly.com/, June 2015.
-
SGX Tutorial, ISCA 2015
-
-
-
25
-
-
85180757640
-
Intel sgx enclave support in windows 10 fall update
-
A. Ionescu. Intel sgx enclave support in windows 10 fall update. Winsider Technical White Paper, 2015.
-
(2015)
Winsider Technical White Paper
-
-
Ionescu, A.1
-
26
-
-
84889028646
-
Users get routed: Traffic correlation on tor by realistic adversaries
-
ACM
-
A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. Users get routed: Traffic correlation on tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 337-348. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
, pp. 337-348
-
-
Johnson, A.1
Wacek, C.2
Jansen, R.3
Sherr, M.4
Syverson, P.5
-
27
-
-
84962655697
-
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications
-
Philadelphia, PA, Nov
-
S. Kim, Y. Shin, J. Ha, T. Kim, and D. Han. A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, PA, Nov. 2015.
-
(2015)
Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets)
-
-
Kim, S.1
Shin, Y.2
Ha, J.3
Kim, T.4
Han, D.5
-
28
-
-
72249120603
-
sel4: Formal verification of an os kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: Formal verification of an os kernel. In Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP '09, pages 207-220, 2009.
-
(2009)
Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP '09
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
29
-
-
84900427392
-
Trustlite: a security architecture for tiny embedded devices
-
page ACM
-
P. Koeberl, S. Schulz, A.-R. Sadeghi, and V. Varadharajan. Trustlite: a security architecture for tiny embedded devices. In Proceedings of the Ninth European Conference on Computer Systems (EuroSys), page 10. ACM, 2014.
-
(2014)
Proceedings of the Ninth European Conference on Computer Systems (EuroSys)
, pp. 10
-
-
Koeberl, P.1
Schulz, S.2
Sadeghi, A.-R.3
Varadharajan, V.4
-
30
-
-
85084096178
-
One bad apple spoils the bunch: Exploiting p2p applications to trace and profile tor users
-
S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, C. Castelluccia, A. Legout, and W. Dabbous. One bad apple spoils the bunch: Exploiting p2p applications to trace and profile tor users. In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, pages 2-2, 2011.
-
(2011)
Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats
, pp. 2-2
-
-
Le Blond, S.1
Manils, P.2
Chaabane, A.3
Kaafar, M. A.4
Castelluccia, C.5
Legout, A.6
Dabbous, W.7
-
31
-
-
85076877909
-
TrInc: Small trusted hardware for large distributed systems
-
Boston, MA, Apr
-
D. Levin, J. R. Douceur, J. R. Lorch, and T. Moscibroda. TrInc: Small trusted hardware for large distributed systems. In Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI), pages 1-14, Boston, MA, Apr. 2009.
-
(2009)
Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 1-14
-
-
Levin, D.1
Douceur, J. R.2
Lorch, J. R.3
Moscibroda, T.4
-
33
-
-
85077468673
-
MiniBox: A Two-Way Sandbox for x86 Native Code
-
Philadelphia, PA, June
-
Y. Li, J. McCune, J. Newsome, A. Perrig, B. Baker, and W. Drewry. MiniBox: A Two-Way Sandbox for x86 Native Code. In Proceedings of the 2014 ATC Annual Technical Conference (ATC), pages 409-420, Philadelphia, PA, June 2014.
-
(2014)
Proceedings of the 2014 ATC Annual Technical Conference (ATC)
, pp. 409-420
-
-
Li, Y.1
McCune, J.2
Newsome, J.3
Perrig, A.4
Baker, B.5
Drewry, W.6
-
34
-
-
55149108173
-
Flicker: An Execution Infrastructure for TCB Minimization
-
Glasgow, Scotland, Mar
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In Proceedings of the ACM EuroSys Conference, pages 315-328, Glasgow, Scotland, Mar. 2008.
-
(2008)
Proceedings of the ACM EuroSys Conference
, pp. 315-328
-
-
McCune, J. M.1
Parno, B. J.2
Perrig, A.3
Reiter, M. K.4
Isozaki, H.5
-
35
-
-
77955186544
-
TrustVisor: Efficient TCB Reduction and Attestation
-
Oakland, CA, May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proceedings of the 31th IEEE Symposium on Security and Privacy (Oakland), pages 143-158, Oakland, CA, May 2010.
-
(2010)
Proceedings of the 31th IEEE Symposium on Security and Privacy (Oakland)
, pp. 143-158
-
-
McCune, J. M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
36
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
Tel-Aviv, Israel
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), pages 1-8, Tel-Aviv, Israel, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
, pp. 1-8
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C. V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U. R.7
-
38
-
-
84889021626
-
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
-
Berlin, Germany, Oct
-
E. Owusu, J. Guajardo, J. McCune, J. Newsome, A. Perrig, and A. Vasudevan. OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms. In Proceedings of the 20th ACM Conference on Computer and Communications Security, pages 13-24, Berlin, Germany, Oct. 2013.
-
(2013)
Proceedings of the 20th ACM Conference on Computer and Communications Security
, pp. 13-24
-
-
Owusu, E.1
Guajardo, J.2
McCune, J.3
Newsome, J.4
Perrig, A.5
Vasudevan, A.6
-
42
-
-
84945188553
-
VC3: Trustworthy Data Analytics in the Cloud using SGX
-
San Jose, CA, May
-
F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich. VC3: Trustworthy Data Analytics in the Cloud using SGX. In Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, May 2015.
-
(2015)
Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland)
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
43
-
-
84954099331
-
Moat: Verifying confidentiality of enclave programs
-
ACM
-
R. Sinha, S. Rajamani, S. Seshia, and K. Vaswani. Moat: Verifying confidentiality of enclave programs. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 1169-1184. ACM, 2015.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 1169-1184
-
-
Sinha, R.1
Rajamani, S.2
Seshia, S.3
Vaswani, K.4
-
45
-
-
77954565496
-
NOVA: A microhypervisor-based secure virtualization architecture
-
Paris, France, Apr
-
U. Steinberg and B. Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In Proceedings of the ACM EuroSys Conference, pages 209-222, Paris, France, Apr. 2010.
-
(2010)
Proceedings of the ACM EuroSys Conference
, pp. 209-222
-
-
Steinberg, U.1
Kauer, B.2
-
46
-
-
84904654800
-
SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity oses
-
San Diego, CA, Feb
-
K. Sun, J. Wang, F. Zhang, and A. Stavrou. SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity oses. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb. 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium
-
-
Sun, K.1
Wang, J.2
Zhang, F.3
Stavrou, A.4
-
47
-
-
85069201566
-
Raptor: routing attacks on privacy in tor
-
Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and P. Mittal. Raptor: routing attacks on privacy in tor. In USENIX Security Symposium, 2015.
-
(2015)
USENIX Security Symposium
-
-
Sun, Y.1
Edmundson, A.2
Vanbever, L.3
Li, O.4
Rexford, J.5
Chiang, M.6
Mittal, P.7
-
49
-
-
84863094040
-
Trustworthy execution on mobile devices: What security properties can my mobile platform give me?
-
Vienna, Austria
-
A. Vasudevan, E. Owusu, Z. Zhou, J. Newsome, and J. M. McCune. Trustworthy execution on mobile devices: What security properties can my mobile platform give me? In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST), pages 159-178, Vienna, Austria, 2012.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST)
, pp. 159-178
-
-
Vasudevan, A.1
Owusu, E.2
Zhou, Z.3
Newsome, J.4
McCune, J. M.5
-
50
-
-
84960955443
-
-
Wikipedia. [Online; accessed 13-May-2015]
-
Wikipedia. C dynamic memory allocation - wikipedia, the free encyclopedia, 2015. URL http://en.wikipedia.org/w/index.php?title=C_dynamic_memory_ allocation&oldid=658580417. [Online; accessed 13-May-2015].
-
(2015)
C dynamic memory allocation - wikipedia, the free encyclopedia
-
-
-
52
-
-
84903973934
-
Spoiled onions: Exposing malicious tor exit relays
-
Springer
-
P. Winter, R. Kower, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, and E.Weippl. Spoiled onions: Exposing malicious tor exit relays. In Privacy Enhancing Technologies, pages 304-331. Springer, 2014.
-
(2014)
Privacy Enhancing Technologies
, pp. 304-331
-
-
Winter, P.1
Kower, R.2
Mulazzani, M.3
Huber, M.4
Schrittwieser, S.5
Lindskog, S.6
Weippl, E.7
-
53
-
-
84903973934
-
Spoiled onions: Exposing malicious tor exit relays
-
Springer
-
P. Winter, R. Kower, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, and E.Weippl. Spoiled onions: Exposing malicious tor exit relays. In Privacy Enhancing Technologies, pages 304-331. Springer, 2014.
-
(2014)
Privacy Enhancing Technologies
, pp. 304-331
-
-
Winter, P.1
Kower, R.2
Mulazzani, M.3
Huber, M.4
Schrittwieser, S.5
Lindskog, S.6
Weippl, E.7
|