Flicker: An execution infrastructure for TCB minimization JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008 | 1021 | 2008 |
TrustVisor: Efficient TCB reduction and attestation JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig 2010 IEEE Symposium on Security and Privacy, 143-158, 2010 | 852 | 2010 |
Seeing-is-believing: Using camera phones for human-verifiable authentication JM McCune, A Perrig, MK Reiter 2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005 | 758 | 2005 |
VIPER: Verifying the integrity of peripherals' firmware Y Li, JM McCune, A Perrig Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 276 | 2011 |
Bootstrapping trust in commodity computers B Parno, JM McCune, A Perrig 2010 IEEE Symposium on Security and Privacy, 414-429, 2010 | 229 | 2010 |
Building verifiable trusted path on commodity x86 computers Z Zhou, VD Gligor, J Newsome, JM McCune 2012 IEEE symposium on security and privacy, 616-630, 2012 | 193 | 2012 |
Detection of denial-of-message attacks on sensor network broadcasts JM McCune, E Shi, A Perrig, MK Reiter 2005 IEEE Symposium on Security and Privacy (S&P'05), 64-78, 2005 | 188 | 2005 |
Design, implementation and verification of an extensible and modular hypervisor framework A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta 2013 IEEE Symposium on Security and Privacy, 430-444, 2013 | 181 | 2013 |
Memoir: Practical state continuity for protected modules B Parno, JR Lorch, JR Douceur, J Mickens, JM McCune 2011 IEEE Symposium on Security and Privacy, 379-394, 2011 | 175 | 2011 |
Shamon: A system for distributed mandatory access control JM McCune, T Jaeger, S Berger, R Caceres, R Sailer 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006 | 150 | 2006 |
{MiniBox}: A {Two-Way} Sandbox for x86 Native Code Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry 2014 USENIX annual technical conference (USENIX ATC 14), 409-420, 2014 | 146 | 2014 |
Device-enabled authorization in the Grey system L Bauer, S Garriss, JM McCune, MK Reiter, J Rouse, P Rutenbar International Conference on Information Security, 431-445, 2005 | 145 | 2005 |
CLAMP: Practical prevention of large-scale data leaks B Parno, JM McCune, D Wendlandt, DG Andersen, A Perrig 2009 30th IEEE Symposium on Security and Privacy, 154-169, 2009 | 130 | 2009 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 126 | 2009 |
Bootstrapping trust in modern computers B Parno, JM McCune, A Perrig Springer Science & Business Media, 2011 | 116 | 2011 |
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012 | 114 | 2012 |
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 109 | 2013 |
SBAP: Software-based attestation for peripherals Y Li, JM McCune, A Perrig Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010 | 103 | 2010 |
How low can you go? Recommendations for hardware-supported minimal TCB code execution JM McCune, B Parno, A Perrig, MK Reiter, A Seshadri ACM SIGOPS Operating Systems Review 42 (2), 14-25, 2008 | 101 | 2008 |
A study of mass-mailing worms C Wong, S Bielski, JM McCune, C Wang Proceedings of the 2004 ACM workshop on Rapid malcode, 1-10, 2004 | 99 | 2004 |