Implementing an Untrusted Operating System on Trusted Hardware (2003)

by David Lie , Chandramohan A. Thekkath , Mark Horowitz
Venue:In Proceedings of the 19th ACM Symposium on Operating Systems Principles
Citations:54 - 0 self

Documents Related by Co-Citation

211 Architectural Support for Copy and Tamper Resistant Software – David Lie, Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, Mark Horowitz - 2000
303 Terra: a virtual machine-based platform for trusted computing – Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh - 2003
1251 Xen and the art of virtualization – Paul Barham, Boris Dragovic, Keir Fraser, Steven H, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
163 Software Protection and Simulation on Oblivious RAMs – Oded Goldreich, Rafail Ostrovsky - 1993
251 Design and implementation of a TCG-based integrity measurement architecture – R SAILER, X ZHANG, T JAEGER, L VAN DOORN
94 AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing – G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas - 2003
240 A Secure and Reliable Bootstrap Architecture – William A. Arbaugh, David J. Farber, Jonathan M. Smith - 1997
28 HIDE: an infrastructure for efficiently protecting information leakage on the address bus – Xiaotong Zhuang, Tao Zhang, Santosh Pande - 2004
140 Direct Anonymous Attestation – Ernie Brickell, Jan Camenisch, Liqun Chen - 2004
52 Efficient Memory Integrity Verification and Encryption for Secure Processors – G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten Van Dijk, Srinivas Devadas - 2003
51 Fast Secure Processor for Inhibiting Software Piracy and Tampering – Jun Yang, Jun Yang Youtao, Lan Gao - 2003
39 Improving Xen security through disaggregation – Derek G. Murray, Grzegorz Milos, Steven Hand
168 EROS: a fast capability system – Jonathan S. Shapiro, Jonathan M. Smith, David J. Farber - 1999
73 Property-based attestation for computing platforms: caring about properties, not mechanisms – Ahmad-reza Sadeghi, Christian Stüble - 2004
64 Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms – A Seshadri, M Luk, E Shi, A Perrig, L van Doorn, P Khosla - 2005
57 Towards a Theory of Software Protection and Simulation by Oblivious RAMs – Oded Goldreich - 1987
28 Keeping secrets in hardware: The microsoft XBox case study – Andrew “bunnie Huang - 2002
41 Caches and Hash Trees for Efficient Memory Integrity Verification – Blaise Gassend, G. Edward Suh, Dwaine Clarke, Marten van Dijk, Srinivas Devadas - 2003
2 Chandrashekar et al. The Cubicle Vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users – F Giroire, J