Jonathan M. McCune, Ph.D.

Affiliations: 
2009 Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science, Electronics and Electrical Engineering
Google:
"Jonathan McCune"

Parents

Sign in to add mentor
Adrian Perrig grad student 2009 Carnegie Mellon
 (Reducing the trusted computing base for applications on commodity systems.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Zhou Z, Gligor VD, Newsome J, et al. (2012) Building verifiable trusted path on commodity x86 computers Proceedings - Ieee Symposium On Security and Privacy. 616-630
Vasudevan A, Owusu E, Zhou Z, et al. (2012) Trustworthy execution on mobile devices: What security properties can my mobile platform give me? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7344: 159-178
Li Y, McCune JM, Perrig A. (2011) VIPER: Verifying the integrity of peripherals' firmware Proceedings of the Acm Conference On Computer and Communications Security. 3-16
Lin YH, Studer A, Chen YH, et al. (2010) SPATE: Small-group PKI-less authenticated trust establishment Ieee Transactions On Mobile Computing. 9: 1666-1681
Parno B, McCune JM, Perrig A. (2010) Bootstrapping trust in commodity computers Proceedings - Ieee Symposium On Security and Privacy. 414-429
McCune JM, Li Y, Qu N, et al. (2010) Trust visor: Efficient TCB reduction and attestation Proceedings - Ieee Symposium On Security and Privacy. 143-158
Li Y, McCune JM, Perrig A. (2010) SBAP: Software-based attestation for peripherals Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 16-29
Vasudevan A, McCune JM, Qu N, et al. (2010) Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 141-165
McCune JM, Perrig A, Reiter MK. (2009) Seeing-Is-Believing: Using camera phones for human-verifiable authentication International Journal of Security and Networks. 4: 43-56
Parno B, McCune JM, Wendlandt D, et al. (2009) CLAMP: Practical prevention of large-scale data leaks Proceedings - Ieee Symposium On Security and Privacy. 154-169
See more...