Jonathan M. McCune, Ph.D. - Publications

Affiliations: 
2009 Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science, Electronics and Electrical Engineering

20 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2012 Zhou Z, Gligor VD, Newsome J, McCune JM. Building verifiable trusted path on commodity x86 computers Proceedings - Ieee Symposium On Security and Privacy. 616-630. DOI: 10.1109/SP.2012.42  0.374
2012 Vasudevan A, Owusu E, Zhou Z, Newsome J, McCune JM. Trustworthy execution on mobile devices: What security properties can my mobile platform give me? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7344: 159-178. DOI: 10.1007/978-3-642-30921-2_10  0.416
2011 Li Y, McCune JM, Perrig A. VIPER: Verifying the integrity of peripherals' firmware Proceedings of the Acm Conference On Computer and Communications Security. 3-16. DOI: 10.1145/2046707.2046711  0.564
2010 Lin YH, Studer A, Chen YH, Hsiao HC, Kuo LH, McCune JM, Wang KH, Krohn M, Perrig A, Yang BY, Sun HM, Lin PL, Lee J. SPATE: Small-group PKI-less authenticated trust establishment Ieee Transactions On Mobile Computing. 9: 1666-1681. DOI: 10.1109/Tmc.2010.150  0.568
2010 Parno B, McCune JM, Perrig A. Bootstrapping trust in commodity computers Proceedings - Ieee Symposium On Security and Privacy. 414-429. DOI: 10.1109/SP.2010.32  0.486
2010 McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A. Trust visor: Efficient TCB reduction and attestation Proceedings - Ieee Symposium On Security and Privacy. 143-158. DOI: 10.1109/SP.2010.17  0.599
2010 Li Y, McCune JM, Perrig A. SBAP: Software-based attestation for peripherals Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 16-29. DOI: 10.1007/978-3-642-13869-0_2  0.601
2010 Vasudevan A, McCune JM, Qu N, Van Doorn L, Perrig A. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 141-165. DOI: 10.1007/978-3-642-13869-0_10  0.584
2009 McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: Using camera phones for human-verifiable authentication International Journal of Security and Networks. 4: 43-56. DOI: 10.1504/IJSN.2009.023425  0.608
2009 Parno B, McCune JM, Wendlandt D, Andersen DG, Perrig A. CLAMP: Practical prevention of large-scale data leaks Proceedings - Ieee Symposium On Security and Privacy. 154-169. DOI: 10.1109/SP.2009.21  0.594
2008 Chen CHO, Chen CW, Kuo C, Lai YH, McCune JM, Studer A, Perrig A, Yang BY, Wu TC. GAnGS: Gather, authenticate 'n group securely Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 92-103. DOI: 10.1145/1409944.1409957  0.393
2008 Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Van Doorn L. Remote detection of virtual machine monitors with fuzzy benchmarking Operating Systems Review (Acm). 42: 83-92. DOI: 10.1145/1368506.1368518  0.535
2008 McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for TCB minimization Operating Systems Review (Acm). 42: 315-328. DOI: 10.1145/1357010.1352625  0.318
2008 McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for tcb minimization Eurosys'08 - Proceedings of the Eurosys 2008 Conference. 315-328. DOI: 10.1145/1352592.1352625  0.564
2008 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution Operating Systems Review (Acm). 42: 14-25. DOI: 10.1145/1346281.1346285  0.597
2008 Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Doorn Lv. Towards sound detection of virtual machines Advances in Information Security. 36: 89-116.  0.508
2007 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution Proceedings - Ieee Symposium On Security and Privacy. 267-272. DOI: 10.1109/SP.2007.27  0.602
2005 McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication Proceedings - Ieee Symposium On Security and Privacy. 110-124. DOI: 10.1504/Ijsn.2009.023425  0.637
2005 McCune JM, Shi E, Perrig A, Reiter MK. Detection of denial-of-message attacks on sensor network broadcasts Proceedings - Ieee Symposium On Security and Privacy. 64-78. DOI: 10.1109/SP.2005.7  0.5
2005 Bauer L, Garriss S, McCune JM, Reiter MK, Rouse J, Rutenbar P. Device-enabled authorization in the grey system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 431-445.  0.313
Show low-probability matches.