Year |
Citation |
Score |
2008 |
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution Operating Systems Review (Acm). 42: 14-25. DOI: 10.1145/1346281.1346285 |
0.364 |
|
2007 |
Seshadri A, Luk M, Qu N, Perrig A. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes Sosp'07 - Proceedings of 21st Acm Sigops Symposium On Operating Systems Principles. 335-350. DOI: 10.1145/1294261.1294294 |
0.352 |
|
2007 |
Seshadri A, Luk M, Perrig A, van Doom L, Khosla P. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems Advances in Information Security. 27: 253-289. DOI: 10.1145/1095810.1095812 |
0.513 |
|
2007 |
Seshadri A, Luk M, Perrig A, van Doom L, Khosla P. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems Advances in Information Security. 27: 253-289. DOI: 10.1145/1095809.1095812 |
0.521 |
|
2007 |
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution Proceedings - Ieee Symposium On Security and Privacy. 267-272. DOI: 10.1109/SP.2007.27 |
0.439 |
|
2006 |
Seshadri A, Luk M, Perrig A, Van Doorn L, Khosla P. SCUBA: Secure Code Update by Attestation in sensor networks Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 85-94. DOI: 10.1145/1161289.1161306 |
0.449 |
|
2006 |
Seshadri A, Luk M, Perrig A, Van Doorn L, Khosla P. Externally verifiable code execution Communications of the Acm. 49: 45-49. DOI: 10.1145/1151030.1151054 |
0.538 |
|
2004 |
Seshadri A, Perrig A, Van Doom L, Khosla P. SWATT: SoftWare-based ATTestation for embedded devices Proceedings - Ieee Symposium On Security and Privacy. 2004: 272-282. DOI: 10.1109/SECPRI.2004.1301329 |
0.401 |
|
Show low-probability matches. |