Jonathan M. McCune
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2014
- [b2]Amit Vasudevan, Jonathan M. McCune, James Newsome:
Trustworthy Execution on Mobile Devices. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4614-8189-8, pp. i-xiii, 1-85 - [c31]Yanlin Li, Jonathan M. McCune, James Newsome, Adrian Perrig, Brandon Baker, Will Drewry:
MiniBox: A Two-Way Sandbox for x86 Native Code. USENIX Annual Technical Conference 2014: 409-420 - 2013
- [c30]Emmanuel Owusu, Jorge Guajardo, Jonathan M. McCune, James Newsome, Adrian Perrig, Amit Vasudevan:
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms. ACM Conference on Computer and Communications Security 2013: 13-24 - [c29]Michael Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan M. McCune, Adrian Perrig:
SafeSlinger: easy-to-use and secure public-key exchange. MobiCom 2013: 417-428 - [c28]Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. IEEE Symposium on Security and Privacy 2013: 430-444 - 2012
- [c27]Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn:
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. AsiaCCS 2012: 48-49 - [c26]Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan:
Parametric Verification of Address Space Separation. POST 2012: 51-68 - [c25]Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune:
Building Verifiable Trusted Path on Commodity x86 Computers. IEEE Symposium on Security and Privacy 2012: 616-630 - [c24]Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune:
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? TRUST 2012: 159-178 - 2011
- [b1]Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Modern Computers. Springer Briefs in Computer Science 10, Springer 2011, ISBN 978-1-4614-1459-9, pp. i-xv, 1-101 - [c23]Yanlin Li, Jonathan M. McCune, Adrian Perrig:
VIPER: verifying the integrity of PERipherals' firmware. ACM Conference on Computer and Communications Security 2011: 3-16 - [c22]Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy:
Uni-directional trusted path: Transaction confirmation on just one device. DSN 2011: 1-12 - [c21]Alana Libonati, Jonathan M. McCune, Michael K. Reiter:
Usability Testing a Malware-Resistant Input Mechanism. NDSS 2011 - [c20]Bryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune:
Memoir: Practical State Continuity for Protected Modules. IEEE Symposium on Security and Privacy 2011: 379-394 - [e1]Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8 [contents] - 2010
- [j2]Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Eric Li-Hsiang Kuo, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Adrian Perrig, Bo-Yin Yang, Hung-Min Sun, Phen-Lan Lin, Jason Lee:
SPATE: Small-Group PKI-Less Authenticated Trust Establishment. IEEE Trans. Mob. Comput. 9(12): 1666-1681 (2010) - [c19]
- [c18]Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. IEEE Symposium on Security and Privacy 2010: 143-158 - [c17]Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Commodity Computers. IEEE Symposium on Security and Privacy 2010: 414-429 - [c16]Yanlin Li, Jonathan M. McCune, Adrian Perrig:
SBAP: Software-Based Attestation for Peripherals. TRUST 2010: 16-29 - [c15]Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig:
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. TRUST 2010: 141-165
2000 – 2009
- 2009
- [j1]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: using camera phones for human-verifiable authentication. IJSN 4(1/2): 43-56 (2009) - [c14]Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
SPATE: small-group PKI-less authenticated trust establishment. MobiSys 2009: 1-14 - [c13]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Safe Passage for Passwords and Other Sensitive Data. NDSS 2009 - [c12]Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig:
CLAMP: Practical Prevention of Large-Scale Data Leaks. IEEE Symposium on Security and Privacy 2009: 154-169 - 2008
- [c11]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 - [c10]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki:
Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328 - [c9]Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu:
GAnGS: gather, authenticate 'n group securely. MobiCom 2008: 92-103 - [p1]Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn:
Towards Sound Detection of Virtual Machines. Botnet Detection 2008: 89-116 - 2007
- [c8]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
Minimal TCB Code Execution. IEEE Symposium on Security and Privacy 2007: 267-272 - [c7]Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn:
Turtles All the Way Down: Research Challenges in User-Based Attestation. HotSec 2007 - 2006
- [c6]Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer:
Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32 - [c5]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX Annual Technical Conference, General Track 2006: 185-198 - 2005
- [c4]Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar:
Device-Enabled Authorization in the Grey-System. ISC 2005: 431-445 - [c3]Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Symposium on Security and Privacy 2005: 64-78 - [c2]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. IEEE Symposium on Security and Privacy 2005: 110-124 - 2004
- [c1]Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang:
A study of mass-mailing worms. WORM 2004: 1-10
Coauthor Index
last updated on 2019-01-09 01:18 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint