Login / Signup
STC@CCS
2011
2011
2011
Keyphrases
Publications
2011
Sven Bugiel
,
Lucas Vincenzo Davi
,
Steffen Schulz
Scalable trust establishment with software reputation.
STC@CCS
(2011)
Ilze Eichhorn
,
Patrick Koeberl
,
Vincent van der Leest
Logically reconfigurable PUFs: memory-based secure key storage.
STC@CCS
(2011)
Emanuele Cesena
,
Gianluca Ramunno
,
Roberto Sassu
,
Davide Vernizzi
,
Antonio Lioy
On scalability of remote attestation.
STC@CCS
(2011)
Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011
STC@CCS
(2011)
Corey Malone
,
Mohamed Zahran
,
Ramesh Karri
Are hardware performance counters a cost effective way for integrity checking of programs.
STC@CCS
(2011)
Jun Ho Huh
,
Hyoungshick Kim
,
John Lyle
,
Andrew P. Martin
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
STC@CCS
(2011)
Sandeep Tamrakar
,
Jan-Erik Ekberg
,
N. Asokan
Identity verification schemes for public transport ticketing with NFC phones.
STC@CCS
(2011)
Anbang Ruan
,
Andrew P. Martin
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems.
STC@CCS
(2011)
Farinaz Koushanfar
Trusting the open latent IC backdoors.
STC@CCS
(2011)
Kari Kostiainen
,
N. Asokan
Credential life cycle management in open credential platforms (short paper).
STC@CCS
(2011)
Lucas Davi
,
Alexandra Dmitrienko
,
Christoph Kowalski
,
Marcel Winandy
Trusted virtual domains on OKL4: secure information sharing on smartphones.
STC@CCS
(2011)
2010
Sven Bugiel
,
Jan-Erik Ekberg
Implementing an application-specific credential platform using late-launched mobile trusted module.
STC@CCS
(2010)
Kenneth A. Goldman
,
Reiner Sailer
,
Dimitrios E. Pendarakis
,
Deepa Srinivasan
Scalable integrity monitoring in virtualized environments.
STC@CCS
(2010)
Paul C. van Oorschot
System security, platform security and usability.
STC@CCS
(2010)
Proceedings of the fifth ACM workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010
STC@CCS
(2010)
Katelin A. Bailey
,
Sean W. Smith
Trusted virtual containers on demand.
STC@CCS
(2010)
Vincent van der Leest
,
Geert Jan Schrijen
,
Helena Handschuh
,
Pim Tuyls
Hardware intrinsic security from D flip-flops.
STC@CCS
(2010)
Hans Löhr
,
Thomas Pöppelmann
,
Johannes Rave
,
Martin Steegmanns
,
Marcel Winandy
Trusted virtual domains on OpenSolaris: usable secure desktop environments.
STC@CCS
(2010)
Carl Gebhardt
,
Chris I. Dalton
,
Allan Tomlinson
Separating hypervisor trusted computing base supported by hardware.
STC@CCS
(2010)
David Lie
,
Lionel Litty
Using hypervisors to secure commodity operating systems.
STC@CCS
(2010)
Alexander Iliev
,
Sean W. Smith
Small, stupid, and scalable: secure computing with faerieplay.
STC@CCS
(2010)
Kurt Dietrich
,
Johannes Winter
Towards customizable, application specific mobile trusted modules.
STC@CCS
(2010)
Anna Shubina
,
Sergey Bratus
,
Wyllys Ingersol
,
Sean W. Smith
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris.
STC@CCS
(2010)
Gernot Heiser
,
June Andronick
,
Kevin Elphinstone
,
Gerwin Klein
,
Ihor Kuz
,
Leonid Ryzhyk
The road to trustworthy systems.
STC@CCS
(2010)