Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jonathan M. McCune
@book{DBLP:series/sbcs/VasudevanMN14, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome}, title = {Trustworthy Execution on Mobile Devices}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-8190-4}, doi = {10.1007/978-1-4614-8190-4}, isbn = {978-1-4614-8189-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/VasudevanMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LiMNPBD14, author = {Yanlin Li and Jonathan M. McCune and James Newsome and Adrian Perrig and Brandon Baker and Will Drewry}, editor = {Garth Gibson and Nickolai Zeldovich}, title = {MiniBox: {A} Two-Way Sandbox for x86 Native Code}, booktitle = {2014 {USENIX} Annual Technical Conference, {USENIX} {ATC} '14, Philadelphia, PA, USA, June 19-20, 2014}, pages = {409--420}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/atc14/technical-sessions/presentation/li\_yanlin}, timestamp = {Mon, 01 Feb 2021 08:43:38 +0100}, biburl = {https://dblp.org/rec/conf/usenix/LiMNPBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OwusuGMNPV13, author = {Emmanuel Owusu and Jorge Guajardo and Jonathan M. McCune and James Newsome and Adrian Perrig and Amit Vasudevan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{OASIS:} on achieving a sanctuary for integrity and secrecy on untrusted platforms}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516678}, doi = {10.1145/2508859.2516678}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OwusuGMNPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/FarbLKMP13, author = {Michael W. Farb and Yue{-}Hsun Lin and Tiffany Hyun{-}Jin Kim and Jonathan M. McCune and Adrian Perrig}, editor = {Sumi Helal and Ranveer Chandra and Robin Kravets}, title = {SafeSlinger: easy-to-use and secure public-key exchange}, booktitle = {The 19th Annual International Conference on Mobile Computing and Networking, MobiCom'13, Miami, FL, USA, September 30 - October 04, 2013}, pages = {417--428}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2500423.2500428}, doi = {10.1145/2500423.2500428}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/FarbLKMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VasudevanCJMND13, author = {Amit Vasudevan and Sagar Chaki and Limin Jia and Jonathan M. McCune and James Newsome and Anupam Datta}, title = {Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {430--444}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.36}, doi = {10.1109/SP.2013.36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasudevanMNPD12, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome and Adrian Perrig and Leendert van Doorn}, editor = {Heung Youl Youm and Yoojae Won}, title = {{CARMA:} a hardware tamper-resistant isolated execution environment on commodity x86 platforms}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {48--49}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414484}, doi = {10.1145/2414456.2414484}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VasudevanMNPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/FranklinCDMV12, author = {Jason Franklin and Sagar Chaki and Anupam Datta and Jonathan M. McCune and Amit Vasudevan}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Parametric Verification of Address Space Separation}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {51--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_4}, doi = {10.1007/978-3-642-28641-4\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/FranklinCDMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouGNM12, author = {Zongwei Zhou and Virgil D. Gligor and James Newsome and Jonathan M. McCune}, title = {Building Verifiable Trusted Path on Commodity x86 Computers}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {616--630}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.42}, doi = {10.1109/SP.2012.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhouGNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanOZNM12, author = {Amit Vasudevan and Emmanuel Owusu and Zongwei Zhou and James Newsome and Jonathan M. McCune}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {159--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_10}, doi = {10.1007/978-3-642-30921-2\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/ParnoMP11, author = {Bryan Parno and Jonathan M. McCune and Adrian Perrig}, title = {Bootstrapping Trust in Modern Computers}, series = {Springer Briefs in Computer Science}, volume = {10}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-1460-5}, doi = {10.1007/978-1-4614-1460-5}, isbn = {978-1-4614-1459-9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/ParnoMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiMP11, author = {Yanlin Li and Jonathan M. McCune and Adrian Perrig}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {{VIPER:} verifying the integrity of PERipherals' firmware}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {3--16}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046711}, doi = {10.1145/2046707.2046711}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/FilyanovMSW11, author = {Atanas Filyanov and Jonathan M. McCune and Ahmad{-}Reza Sadeghi and Marcel Winandy}, title = {Uni-directional trusted path: Transaction confirmation on just one device}, booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011}, pages = {1--12}, publisher = {{IEEE} Compute Society}, year = {2011}, url = {https://doi.org/10.1109/DSN.2011.5958202}, doi = {10.1109/DSN.2011.5958202}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/FilyanovMSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LibonatiMR11, author = {Alana Libonati and Jonathan M. McCune and Michael K. Reiter}, title = {Usability Testing a Malware-Resistant Input Mechanism}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/usability-testing-a-malware-resistant-input-mechanism}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LibonatiMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ParnoLDMM11, author = {Bryan Parno and Jacob R. Lorch and John R. Douceur and James W. Mickens and Jonathan M. McCune}, title = {Memoir: Practical State Continuity for Protected Modules}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {379--394}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.38}, doi = {10.1109/SP.2011.38}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ParnoLDMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2011, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5}, doi = {10.1007/978-3-642-21599-5}, isbn = {978-3-642-21598-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LinSCHKMWKPYSLL10, author = {Yue{-}Hsun Lin and Ahren Studer and Yao{-}Hsin Chen and Hsu{-}Chun Hsiao and Eric Li{-}Hsiang Kuo and Jonathan M. McCune and King{-}Hang Wang and Maxwell N. Krohn and Adrian Perrig and Bo{-}Yin Yang and Hung{-}Min Sun and Phen{-}Lan Lin and Jason Lee}, title = {{SPATE:} Small-Group PKI-Less Authenticated Trust Establishment}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {9}, number = {12}, pages = {1666--1681}, year = {2010}, url = {https://doi.org/10.1109/TMC.2010.150}, doi = {10.1109/TMC.2010.150}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LinSCHKMWKPYSLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchwartzBM10, author = {Edward J. Schwartz and David Brumley and Jonathan M. McCune}, title = {Contractual Anonymity}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/contractual-anonymity}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SchwartzBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCuneLQZDGP10, author = {Jonathan M. McCune and Yanlin Li and Ning Qu and Zongwei Zhou and Anupam Datta and Virgil D. Gligor and Adrian Perrig}, title = {TrustVisor: Efficient {TCB} Reduction and Attestation}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {143--158}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.17}, doi = {10.1109/SP.2010.17}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCuneLQZDGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ParnoMP10, author = {Bryan Parno and Jonathan M. McCune and Adrian Perrig}, title = {Bootstrapping Trust in Commodity Computers}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {414--429}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.32}, doi = {10.1109/SP.2010.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ParnoMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LiMP10, author = {Yanlin Li and Jonathan M. McCune and Adrian Perrig}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {{SBAP:} Software-Based Attestation for Peripherals}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {16--29}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_2}, doi = {10.1007/978-3-642-13869-0\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/LiMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanMQDP10, author = {Amit Vasudevan and Jonathan M. McCune and Ning Qu and Leendert van Doorn and Adrian Perrig}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {141--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_10}, doi = {10.1007/978-3-642-13869-0\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanMQDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/McCunePR09, author = {Jonathan M. McCune and Adrian Perrig and Michael K. Reiter}, title = {Seeing-Is-Believing: using camera phones for human-verifiable authentication}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {43--56}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023425}, doi = {10.1504/IJSN.2009.023425}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/McCunePR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/LinSHMWKLPSY09, author = {Yue{-}Hsun Lin and Ahren Studer and Hsu{-}Chun Hsiao and Jonathan M. McCune and King{-}Hang Wang and Maxwell N. Krohn and Phen{-}Lan Lin and Adrian Perrig and Hung{-}Min Sun and Bo{-}Yin Yang}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, title = {{SPATE:} small-group PKI-less authenticated trust establishment}, booktitle = {Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland, June 22-25, 2009}, pages = {1--14}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555816.1555818}, doi = {10.1145/1555816.1555818}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/LinSHMWKLPSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/McCunePR09, author = {Jonathan M. McCune and Adrian Perrig and Michael K. Reiter}, title = {Safe Passage for Passwords and Other Sensitive Data}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/safe-passage-for-passwords-and-other-sensitive-data/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/McCunePR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ParnoMWAP09, author = {Bryan Parno and Jonathan M. McCune and Dan Wendlandt and David G. Andersen and Adrian Perrig}, title = {{CLAMP:} Practical Prevention of Large-Scale Data Leaks}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {154--169}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.21}, doi = {10.1109/SP.2009.21}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ParnoMWAP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/McCunePPRS08, author = {Jonathan M. McCune and Bryan Parno and Adrian Perrig and Michael K. Reiter and Arvind Seshadri}, editor = {Susan J. Eggers and James R. Larus}, title = {How low can you go?: recommendations for hardware-supported minimal {TCB} code execution}, booktitle = {Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2008, Seattle, WA, USA, March 1-5, 2008}, pages = {14--25}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1346281.1346285}, doi = {10.1145/1346281.1346285}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/McCunePPRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/McCunePPRI08, author = {Jonathan M. McCune and Bryan Parno and Adrian Perrig and Michael K. Reiter and Hiroshi Isozaki}, editor = {Joseph S. Sventek and Steven Hand}, title = {Flicker: an execution infrastructure for tcb minimization}, booktitle = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008}, pages = {315--328}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352592.1352625}, doi = {10.1145/1352592.1352625}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/McCunePPRI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/ChenCKLMSPYW08, author = {Chia{-}Hsin Owen Chen and Chung{-}Wei Chen and Cynthia Kuo and Yan{-}Hao Lai and Jonathan M. McCune and Ahren Studer and Adrian Perrig and Bo{-}Yin Yang and Tzong{-}Chen Wu}, editor = {J. J. Garcia{-}Luna{-}Aceves and Raghupathy Sivakumar and Peter Steenkiste}, title = {GAnGS: gather, authenticate 'n group securely}, booktitle = {Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2008, San Francisco, California, USA, September 14-19, 2008}, pages = {92--103}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1409944.1409957}, doi = {10.1145/1409944.1409957}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/ChenCKLMSPYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FranklinLMSPD08, author = {Jason Franklin and Mark Luk and Jonathan M. McCune and Arvind Seshadri and Adrian Perrig and Leendert van Doorn}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Towards Sound Detection of Virtual Machines}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {89--116}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_5}, doi = {10.1007/978-0-387-68768-1\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FranklinLMSPD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCunePPRS07, author = {Jonathan M. McCune and Bryan Parno and Adrian Perrig and Michael K. Reiter and Arvind Seshadri}, title = {Minimal {TCB} Code Execution}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {267--272}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.27}, doi = {10.1109/SP.2007.27}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCunePPRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McCunePSD07, author = {Jonathan M. McCune and Adrian Perrig and Arvind Seshadri and Leendert van Doorn}, title = {Turtles All the Way Down: Research Challenges in User-Based Attestation}, booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston, MA, USA, August 7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotsec-07/turtles-all-way-down-research-challenges-user-based-attestation}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/McCunePSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McCuneJBCS06, author = {Jonathan M. McCune and Trent Jaeger and Stefan Berger and Ram{\'{o}}n C{\'{a}}ceres and Reiner Sailer}, title = {Shamon: {A} System for Distributed Mandatory Access Control}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {23--32}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.47}, doi = {10.1109/ACSAC.2006.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McCuneJBCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/McCunePR06, author = {Jonathan M. McCune and Adrian Perrig and Michael K. Reiter}, editor = {Atul Adya and Erich M. Nahum}, title = {Bump in the Ether: {A} Framework for Securing Sensitive User Input}, booktitle = {Proceedings of the 2006 {USENIX} Annual Technical Conference, Boston, MA, USA, May 30 - June 3, 2006}, pages = {185--198}, publisher = {{USENIX}}, year = {2006}, url = {http://www.usenix.org/events/usenix06/tech/mccune.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usenix/McCunePR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BauerGMRRR05, author = {Lujo Bauer and Scott Garriss and Jonathan M. McCune and Michael K. Reiter and Jason Rouse and Peter Rutenbar}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Device-Enabled Authorization in the Grey-System}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {431--445}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_31}, doi = {10.1007/11556992\_31}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BauerGMRRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCuneSPR05, author = {Jonathan M. McCune and Elaine Shi and Adrian Perrig and Michael K. Reiter}, title = {Detection of Denial-of-Message Attacks on Sensor Network Broadcasts}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {64--78}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.7}, doi = {10.1109/SP.2005.7}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCuneSPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCunePR05, author = {Jonathan M. McCune and Adrian Perrig and Michael K. Reiter}, title = {Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {110--124}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.19}, doi = {10.1109/SP.2005.19}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCunePR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/WongBMW04, author = {Cynthia Wong and Stan Bielski and Jonathan M. McCune and Chenxi Wang}, editor = {Vern Paxson}, title = {A study of mass-mailing worms}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004, Washington, DC, USA, October 29, 2004}, pages = {1--10}, publisher = {{ACM} Press}, year = {2004}, url = {https://doi.org/10.1145/1029618.1029620}, doi = {10.1145/1029618.1029620}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/WongBMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.