Design, implementation and verification of an extensible and modular hypervisor framework

A Vasudevan, S Chaki, L Jia, J McCune… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …

Case: Cache-assisted secure execution on arm processors

N Zhang, K Sun, W Lou, YT Hou - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has
been adopted in both academic research and commercial products to protect sensitive code …

[PDF][PDF] AirBag: Boosting Smartphone Resistance to Malware Infection.

C Wu, Y Zhou, K Patel, Z Liang, X Jiang - NDSS, 2014 - comp.nus.edu.sg
Recent years have experienced explosive growth of smartphone sales. Inevitably, the rise in
the popularity of smartphones also makes them an attractive target for attacks. In light of …

[图书][B] Bootstrapping trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels

AM Dunn, MZ Lee, S Jana, S Kim… - … USENIX Symposium on …, 2012 - usenix.org
Modern systems keep long memories. As we show in this paper, an adversary who gains
access to a Linux system, even one that implements secure deallocation, can recover the …

{überSpark}: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor

A Vasudevan, S Chaki, P Maniatis, L Jia… - 25th USENIX Security …, 2016 - usenix.org
We present überSpark (üSpark), an innovative architecture for compositional verification
of security properties of extensible hypervisors written in C and Assembly. üSpark …

Droidvault: A trusted data vault for android devices

X Li, H Hu, G Bai, Y Jia, Z Liang… - 2014 19th International …, 2014 - ieeexplore.ieee.org
Mobile OSes and applications form a large, complex and vulnerability-prone software stack.
In such an environment, security techniques to strongly protect sensitive data in mobile …

Towards an architecture for trusted edge {IoT} security gateways

M McCormack, A Vasudevan, G Liu… - 3rd USENIX Workshop …, 2020 - usenix.org
Today's edge networks continue to see an increasing number of deployed IoT devices.
These IoT devices aim to increase productivity and efficiency; however, they are plagued by …

Reconciling end-to-end confidentiality and data reduction in cloud storage

N Baracaldo, E Androulaki, J Glider… - … of the 6th Edition of the …, 2014 - dl.acm.org
An increasingly common practice for users of storage systems is to perform end-to-end
encryption to ensure the confidentiality of data stored on external storage systems or in the …

Notary: A device for secure transaction approval

A Athalye, A Belay, MF Kaashoek, R Morris… - Proceedings of the 27th …, 2019 - dl.acm.org
Notary is a new hardware and software architecture for running isolated approval agents in
the form factor of a USB stick with a small display and buttons. Approval agents allow …