SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
暂无分享,去创建一个
Brent Byunghoon Kang | Minsu Kim | Brent ByungHoon Kang | Jin Soo Jang | Sunjune Kong | Daegyeong Kim | Dae-Nam Kim | Jinsoo Jang | Sunjune Kong | Minsu Kim | Daegyeong Kim
[1] Zhi Wang,et al. Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring , 2011, CCS '11.
[2] Dan Boneh,et al. Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .
[3] Trent Jaeger,et al. Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture , 2014, ArXiv.
[4] Abhinav Srivastava,et al. Efficient Monitoring of Untrusted Kernel-Mode Execution , 2011, NDSS.
[5] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[6] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[7] Jiang Wang,et al. HyperCheck: A Hardware-AssistedIntegrity Monitor , 2014, IEEE Transactions on Dependable and Secure Computing.
[8] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[9] Richard Earnshaw. Procedure Call Standard for the ARM ® Architecture , 2006 .
[10] Vikram S. Adve,et al. Virtual ghost: protecting applications from hostile operating systems , 2014, ASPLOS.
[11] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[12] Jaehyuk Huh,et al. Architectural support for secure virtualization under a vulnerable hypervisor , 2011, 2011 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[13] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[14] Alec Wolman,et al. Software abstractions for trusted sensors , 2012, MobiSys '12.
[15] Alec Wolman,et al. Using ARM trustzone to build a trusted language runtime for mobile applications , 2014, ASPLOS.
[16] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[17] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[18] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[19] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[20] Tal Garfinkel,et al. Towards Application Security on Untrusted Operating Systems , 2008, HotSec.
[21] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[22] Emmett Witchel,et al. InkTag: secure applications on an untrusted operating system , 2013, ASPLOS '13.
[23] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[24] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.