Efficient Virtualization-Based Application Protection Against Untrusted Operating System
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Die PERSEUS Systemarchitektur , 2001 .
[2] Hermann Härtig,et al. The Nizza secure-system architecture , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[3] Emmett Witchel,et al. InkTag: secure applications on an untrusted operating system , 2013, ASPLOS '13.
[4] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[5] James Newsome,et al. MiniBox: A Two-Way Sandbox for x86 Native Code , 2014, USENIX ATC.
[6] Kang G. Shin,et al. Using hypervisor to provide data secrecy for user applications on a per-page basis , 2008, VEE '08.
[7] Brian Rogers,et al. SecureME: a hardware-software approach to full system security , 2011, ICS '11.
[8] Intel ® Trusted Execution Technology ( Intel ® TXT ) , .
[9] Ruby B. Lee,et al. Scalable architectural support for trusted software , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[10] David Lie,et al. Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.
[11] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[12] Birgit Pfitzmann,et al. The PERSEUS System Architecture , 2001 .
[13] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[14] Robert H. Deng,et al. DriverGuard: A Fine-Grained Protection on I/O Flows , 2011, ESORICS.
[15] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[16] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[17] Alex Landau,et al. ELI: bare-metal performance for I/O virtualization , 2012, ASPLOS XVII.
[18] Butler W. Lampson,et al. A Trusted Open Platform , 2003, Computer.
[19] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[20] Frank Piessens,et al. Fides: selectively hardening software application components against kernel-level or process-level malware , 2012, CCS '12.
[21] Hovav Shacham,et al. Iago attacks: why the system call API is a bad untrusted RPC interface , 2013, ASPLOS '13.
[22] David Weiss,et al. Secure system architecture , 1974, CARN.
[23] Vikram S. Adve,et al. Virtual ghost: protecting applications from hostile operating systems , 2014, ASPLOS.
[24] Jonathan M. Smith,et al. Eros: a capability system , 1999 .
[25] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[26] Cheng Chen,et al. Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor , 2007 .
[27] Xuhua Ding,et al. Guardian: Hypervisor as Security Foothold for Personal Computers , 2013, TRUST.
[28] Jiang Wang,et al. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes , 2012, NDSS.
[29] Adrian Perrig,et al. Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms , 2012, TRUST.
[30] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[31] James Newsome,et al. Building Verifiable Trusted Path on Commodity x86 Computers , 2012, 2012 IEEE Symposium on Security and Privacy.