Scalable architectural support for trusted software
暂无分享,去创建一个
[1] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.
[2] Gil Neiger,et al. IntelŴVirtualization Technology: Hardware Support for Efficient Processor Virtualization , 2006 .
[3] Sergey Bratus,et al. TOCTOU, Traps, and Trusted Computing , 2008, TRUST.
[4] Willy Zwaenepoel,et al. Diagnosing performance overheads in the xen virtual machine environment , 2005, VEE '05.
[5] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[6] G. Edward Suh,et al. Caches and Merkle Trees for Efficient Memory Authentication , 2002 .
[7] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[8] Brian Rogers,et al. Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly , 2007, 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO 2007).
[9] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.
[10] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[11] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[12] Ruby B. Lee,et al. The Reduced Address Space (RAS) for Application Memory Authentication , 2008, ISC.
[13] Sean W. Smith,et al. Open-source applications of TCPA hardware , 2004, 20th Annual Computer Security Applications Conference.
[14] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[15] Ruby B. Lee,et al. Hardware-Assisted Application-Level Access Control , 2009, ISC.
[16] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[17] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[18] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[19] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[20] Men Long,et al. A hypervisor-based system for protecting software runtime memory and persistent storage , 2008, SpringSim '08.
[21] Butler W. Lampson,et al. A Trusted Open Platform , 2003, Computer.
[22] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[23] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[24] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[25] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[26] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[27] Glenn Durfee,et al. Practical Uses of Virtual Machines for Protection of Sensitive User Data , 2007, ISPEC.
[28] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[29] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.