Implementing an Untrusted Operating System on Trusted Hardware (2003)

by David Lie , Chandramohan A. Thekkath , Mark Horowitz
Venue:In Proceedings of the 19th ACM Symposium on Operating Systems Principles
Citations:54 - 0 self

Active Bibliography

3 Reducing the Trusted Computing Base for Applications on Commodity Systems – Jonathan M. Mccune - 2009
Separating Protection and Resource Management in Operating Systems – David Lie, Chandramohan A. Thekkath, Mark Horowitz - 2002
211 Architectural Support for Copy and Tamper Resistant Software – David Lie, Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, Mark Horowitz - 2000
1 Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash – Dan Williams, Emin Gün Sirer
303 Terra: a virtual machine-based platform for trusted computing – Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh - 2003
37 Architecture for protecting critical secrets in microprocessors – Ruby B. Lee, Peter C. S. Kwan, John P. Mcgregor, Jeffrey Dwoskin, Zhenghong Wang - 2005
Towards Trustworthy Virtualisation: Improving the Trusted Virtual Infrastructure – Carl Gebhardt, Carl Gebhardt, Carl Gebhardt - 2010
5 SAFE-OPS: An approach to embedded software security – Joseph Zambreno, Alok Choudhary - 2005
41 Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear – John Marchesini, Sean Smith, Omen Wild, Rich Macdonald - 2003
65 Outbound Authentication for Programmable Secure Coprocessors – S. W. Smith - 2004
1 Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers – Bryan Jeffrey Parno - 2010
8 Chaining Layered Integrity Checks – William A. Arbaugh - 1999
9 Secure Quality of Service Handling: SQoSH – D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Steve Muir, Jonathan M. Smith - 2000
Security Considerations of Commodity x86 Virtualization – Sami Vaarala - 2006
5 The AEGIS processor architecture for tamperevident and tamper resistant processing – Edward Suh, Dwaine Clarke, Blaise Gassend, Marten Van Dijk, Srini Devadas, G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten Van Dijk, Srinivas Devadas - 2003
94 AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing – G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas - 2003
Design and Implementation of a Distributed Virtual – Machine For Networked, Emin Gün Sirer, Robert Grimm, Arthur J. Gregory, Brian N. Bershad
57 Design and Implementation of a Distributed Virtual Machine for Networked Computers – Emin Gün Sirer, Robert Grimm, Arthur J. Gregory, Brian N. Bershad - 1999
47 Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems – Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, Dan R. K. Ports - 2008