Jonathan M. McCune, Ph.D.
Affiliations: | 2009 | Carnegie Mellon University, Pittsburgh, PA |
Area:
Computer Science, Electronics and Electrical EngineeringGoogle:
"Jonathan McCune"Parents
Sign in to add mentorAdrian Perrig | grad student | 2009 | Carnegie Mellon | |
(Reducing the trusted computing base for applications on commodity systems.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Zhou Z, Gligor VD, Newsome J, et al. (2012) Building verifiable trusted path on commodity x86 computers Proceedings - Ieee Symposium On Security and Privacy. 616-630 |
Vasudevan A, Owusu E, Zhou Z, et al. (2012) Trustworthy execution on mobile devices: What security properties can my mobile platform give me? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7344: 159-178 |
Li Y, McCune JM, Perrig A. (2011) VIPER: Verifying the integrity of peripherals' firmware Proceedings of the Acm Conference On Computer and Communications Security. 3-16 |
Lin YH, Studer A, Chen YH, et al. (2010) SPATE: Small-group PKI-less authenticated trust establishment Ieee Transactions On Mobile Computing. 9: 1666-1681 |
Parno B, McCune JM, Perrig A. (2010) Bootstrapping trust in commodity computers Proceedings - Ieee Symposium On Security and Privacy. 414-429 |
McCune JM, Li Y, Qu N, et al. (2010) Trust visor: Efficient TCB reduction and attestation Proceedings - Ieee Symposium On Security and Privacy. 143-158 |
Li Y, McCune JM, Perrig A. (2010) SBAP: Software-based attestation for peripherals Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 16-29 |
Vasudevan A, McCune JM, Qu N, et al. (2010) Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 141-165 |
McCune JM, Perrig A, Reiter MK. (2009) Seeing-Is-Believing: Using camera phones for human-verifiable authentication International Journal of Security and Networks. 4: 43-56 |
Parno B, McCune JM, Wendlandt D, et al. (2009) CLAMP: Practical prevention of large-scale data leaks Proceedings - Ieee Symposium On Security and Privacy. 154-169 |