Year |
Citation |
Score |
2012 |
Zhou Z, Gligor VD, Newsome J, McCune JM. Building verifiable trusted path on commodity x86 computers Proceedings - Ieee Symposium On Security and Privacy. 616-630. DOI: 10.1109/SP.2012.42 |
0.374 |
|
2012 |
Vasudevan A, Owusu E, Zhou Z, Newsome J, McCune JM. Trustworthy execution on mobile devices: What security properties can my mobile platform give me? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7344: 159-178. DOI: 10.1007/978-3-642-30921-2_10 |
0.416 |
|
2011 |
Li Y, McCune JM, Perrig A. VIPER: Verifying the integrity of peripherals' firmware Proceedings of the Acm Conference On Computer and Communications Security. 3-16. DOI: 10.1145/2046707.2046711 |
0.564 |
|
2010 |
Lin YH, Studer A, Chen YH, Hsiao HC, Kuo LH, McCune JM, Wang KH, Krohn M, Perrig A, Yang BY, Sun HM, Lin PL, Lee J. SPATE: Small-group PKI-less authenticated trust establishment Ieee Transactions On Mobile Computing. 9: 1666-1681. DOI: 10.1109/Tmc.2010.150 |
0.568 |
|
2010 |
Parno B, McCune JM, Perrig A. Bootstrapping trust in commodity computers Proceedings - Ieee Symposium On Security and Privacy. 414-429. DOI: 10.1109/SP.2010.32 |
0.486 |
|
2010 |
McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A. Trust visor: Efficient TCB reduction and attestation Proceedings - Ieee Symposium On Security and Privacy. 143-158. DOI: 10.1109/SP.2010.17 |
0.599 |
|
2010 |
Li Y, McCune JM, Perrig A. SBAP: Software-based attestation for peripherals Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 16-29. DOI: 10.1007/978-3-642-13869-0_2 |
0.601 |
|
2010 |
Vasudevan A, McCune JM, Qu N, Van Doorn L, Perrig A. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 141-165. DOI: 10.1007/978-3-642-13869-0_10 |
0.584 |
|
2009 |
McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: Using camera phones for human-verifiable authentication International Journal of Security and Networks. 4: 43-56. DOI: 10.1504/IJSN.2009.023425 |
0.608 |
|
2009 |
Parno B, McCune JM, Wendlandt D, Andersen DG, Perrig A. CLAMP: Practical prevention of large-scale data leaks Proceedings - Ieee Symposium On Security and Privacy. 154-169. DOI: 10.1109/SP.2009.21 |
0.594 |
|
2008 |
Chen CHO, Chen CW, Kuo C, Lai YH, McCune JM, Studer A, Perrig A, Yang BY, Wu TC. GAnGS: Gather, authenticate 'n group securely Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 92-103. DOI: 10.1145/1409944.1409957 |
0.393 |
|
2008 |
Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Van Doorn L. Remote detection of virtual machine monitors with fuzzy benchmarking Operating Systems Review (Acm). 42: 83-92. DOI: 10.1145/1368506.1368518 |
0.535 |
|
2008 |
McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for TCB minimization Operating Systems Review (Acm). 42: 315-328. DOI: 10.1145/1357010.1352625 |
0.318 |
|
2008 |
McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for tcb minimization Eurosys'08 - Proceedings of the Eurosys 2008 Conference. 315-328. DOI: 10.1145/1352592.1352625 |
0.564 |
|
2008 |
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution Operating Systems Review (Acm). 42: 14-25. DOI: 10.1145/1346281.1346285 |
0.597 |
|
2008 |
Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Doorn Lv. Towards sound detection of virtual machines Advances in Information Security. 36: 89-116. |
0.508 |
|
2007 |
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution Proceedings - Ieee Symposium On Security and Privacy. 267-272. DOI: 10.1109/SP.2007.27 |
0.602 |
|
2005 |
McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication Proceedings - Ieee Symposium On Security and Privacy. 110-124. DOI: 10.1504/Ijsn.2009.023425 |
0.637 |
|
2005 |
McCune JM, Shi E, Perrig A, Reiter MK. Detection of denial-of-message attacks on sensor network broadcasts Proceedings - Ieee Symposium On Security and Privacy. 64-78. DOI: 10.1109/SP.2005.7 |
0.5 |
|
2005 |
Bauer L, Garriss S, McCune JM, Reiter MK, Rouse J, Rutenbar P. Device-enabled authorization in the grey system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 431-445. |
0.313 |
|
Show low-probability matches. |