Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Paulo Veríssimo, António Casimiro, Christof Fetzer |
he Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
|
75 | Bob Blakley 0001, Darrell M. Kienzle |
Some weaknesses of the TCB model. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
TCB model weaknesses, systems construction, system security architectures, security of data, security requirements, trusted computing base |
74 | Tiancheng Li, Xiaonan Ma, Ninghui Li |
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
63 | Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth |
Reducing TCB complexity for security-sensitive applications: three case studies. |
EuroSys |
2006 |
DBLP DOI BibTeX RDF |
trusted computing base, application security |
63 | Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro |
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. |
ACM SIGOPS European Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |
TrustVisor: Efficient TCB Reduction and Attestation. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement |
55 | Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 |
Improving Xen security through disaggregation. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing base, disaggregation |
55 | Jeong Woo Lee 0001, Richard E. Blahut |
Convergence Analysis and BER Performance of Finite-Length Turbo Codes. |
IEEE Trans. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Tom Waayers |
An improved Test Control Architecture and Test Control Expansion for Core-Based System Chips. |
ITC |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Robert R. Schneck, George C. Necula |
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code. |
CADE |
2002 |
DBLP DOI BibTeX RDF |
|
55 | António Casimiro, Paulo Veríssimo |
Using the Timely Computing Base for Dependable QoS Adaptation. |
SRDS |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri |
How low can you go?: recommendations for hardware-supported minimal TCB code execution. |
ASPLOS |
2008 |
DBLP DOI BibTeX RDF |
late launch, secure execution, trusted computing |
37 | Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang |
Systematic Policy Analysis for High-Assurance Services in SELinux. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
SELinux, Policy Analysis |
37 | Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis |
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Andrew W. Appel, Neophytos G. Michael, Aaron Stump, Roberto Virga |
A Trustworthy Proof Checker. |
J. Autom. Reason. |
2003 |
DBLP DOI BibTeX RDF |
proof checker, proof-carrying code |
37 | Howard E. Shrobe, Jon Doyle |
Active Trust Management for Autonomous Adaptive Survivable Systems. |
IWSAS |
2000 |
DBLP DOI BibTeX RDF |
|
37 | Mark Aldrich |
Secured Systems and Ada: A Trusted System Software Architecture. |
TRI-Ada |
1994 |
DBLP DOI BibTeX RDF |
Ada |
32 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
A Two-Step Execution Mechanism for Thin Secure Hypervisors. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM |
26 | Taichi Takemura, Ryo Yamamoto, Kuniyasu Suzaki |
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Ting-Yu Chen, Zong-Yu Wang, Tsung-Chu Huang |
TCB Convolution: Ternary-Coded Binarized Convolutions with Fixed-Point Filters. |
ICCE-Taiwan |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Zhihao Yao 0001, Seyed Mohammadjavad Seyed Talebi, Mingyi Chen, Ardalan Amiri Sani, Thomas E. Anderson |
Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware. |
MobiSys |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Haikuan Zhu, Juan Cao, Yanyang Xiao, Zhonggui Chen, Zichun Zhong, Yongjie Jessica Zhang |
TCB-spline-based Image Vectorization. |
ACM Trans. Graph. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Boqian Fu, Fahao Chen, Peng Li 0017, Deze Zeng |
TCB: Accelerating Transformer Inference Services with Request Concatenation. |
ICPP |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun |
PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
26 | Marcela S. Melara, Michael J. Freedman, Mic Bowman |
EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
26 | Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar |
A TCB Minimizing Model of Computation. |
SSCC |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Ramana Kumar, Eric Mullen, Zachary Tatlock, Magnus O. Myreen |
Software Verification with ITPs Should Use Binary Code Extraction to Reduce the TCB - (Short Paper). |
ITP |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Eric Mullen, Stuart Pernsteiner, James R. Wilcox, Zachary Tatlock, Dan Grossman |
Œuf: minimizing the Coq extraction TCB. |
CPP |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste |
Secure Tera-scale Data Crunching with a Small TCB. |
DSN |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Job Noorman, Jan Tobias Mühlberg, Frank Piessens |
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. |
STM |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena |
Panoply: Low-TCB Linux Applications With SGX Enclaves. |
NDSS |
2017 |
DBLP BibTeX RDF |
|
26 | Jaemin Park, Kwangjo Kim |
TM-Coin: Trustworthy management of TCB measurements in IoT. |
PerCom Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Chen Zhou 0001, Hao Jiang 0010, Yanqiu Chen, Jing Wu 0016, Jianguo Zhou, Yuanshan Wu |
TCB: A feature transformation method based central behavior for user interest prediction on mobile big data. |
Int. J. Distributed Sens. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Weizhong Qiang, Kang Zhang, Hai Jin 0001 |
Reducing TCB of Linux Kernel Using User-Space Device Driver. |
ICA3PP |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Francois Serman |
Reducing hardware TCB in favor of certifiable virtual machine monitor. (Réduction des besoins de confiance matérielle pour le développement d'un hyperviseur certifié). |
|
2016 |
RDF |
|
26 | Yossi Gilad, Amir Herzberg, Ari Trachtenberg |
Securing Smartphones: A Micro-TCB Approach. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
26 | Florian Yger |
Challenge IEEE-ISBI/TCB : Application of Covariance matrices and wavelet marginals. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
26 | Munam Ali Shah, Irfan Azam, Muhammad Qasim Khan, Sijing Zhang |
Enhanced micro-TCB approach for smartphone security. |
ICAC |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Min Li, Zili Zha, Wanyu Zang, Meng Yu 0001, Peng Liu 0005, Kun Bai |
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. |
ESORICS (1) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Bernhard Kauer |
Improving system security through TCB reduction. |
|
2014 |
RDF |
|
26 | Arun Velagapalli, Mahalingam Ramkumar |
Trustworthy TCB for DNS Servers. |
Int. J. Netw. Secur. |
2012 |
DBLP BibTeX RDF |
|
26 | Reinhard Tartler, Anil Kurmus, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Daniela Dorneanu, Rüdiger Kapitza, Wolfgang Schröder-Preikschat, Daniel Lohmann |
Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability. |
HotDep |
2012 |
DBLP BibTeX RDF |
|
26 | Somya D. Mohanty, Arun Velagapalli, Mahalingam Ramkumar |
An Efficient TCB for a Generic Content Distribution System. |
CyberC |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Anbang Ruan, Andrew P. Martin |
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. |
STC@CCS |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Masana Murase, Hideyuki Tokuda |
Dependable TCB Based on the Cell Broadband Engine Isolation Facility. |
RTCSA (1) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Xin Zhang 0003, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor |
Network fault localization with small TCB. |
ICNP |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Arun Velagapalli, Mahalingam Ramkumar |
Minimizing the TCB for securing SCADA systems. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Mark R. Heckman, Roger R. Schell, Edwards E. Reed |
Using a high assurance TCB for infrastructure security. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ryan W. Gardner, Sujata Garera, Aviel D. Rubin |
Designing for Audit: A Voting Machine with a Tiny TCB. |
Financial Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yong Li, Xing Zhang |
A trust model of TCB subsets. |
ICMLC |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Yu, Steve R. King |
A new TCB cache to efficiently manage TCP sessions for web servers. |
ANCS |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki |
Flicker: an execution infrastructure for tcb minimization. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
late launch, secure execution, trusted computing |
26 | Sung-Sae Lee, Seong-Wook Choi, Gun-Woo Moon |
High-Efficiency Active-Clamp Forward Converter With Transient Current Build-Up (TCB) ZVS Technique. |
IEEE Trans. Ind. Electron. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jacob Gorm Hansen, Eske Christiansen, Eric Jul |
Evil twins: two models for TCB reduction in HPC clusters. |
ACM SIGOPS Oper. Syst. Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri |
Minimal TCB Code Execution. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Steven R. Hackenberg |
CICS open transaction environment and other TCB performance considerations. |
Int. CMG Conference |
2006 |
DBLP BibTeX RDF |
|
26 | Anthony G. Mungal |
A TCB/SRB Analysis Approach To Estimating CPU Productivity Through Fast I/O. |
Int. CMG Conference |
1995 |
DBLP BibTeX RDF |
|
26 | Jingsha He, Virgil D. Gligor |
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu |
A Layered TCB Implementation versus the Hinke-Schaefer Approach. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
26 | Helena B. Winkler-Parenty |
Considerations on TCB subsetting. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Richard J. Feiertag |
Does TCB subsetting enhance trust? |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Linda L. Vetter, Gordon Smith, Teresa F. Lunt |
TCB subsets: the next step. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Linda L. Vetter |
TCB subset architecture. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
26 | James P. Anderson |
An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments. |
S&P |
1983 |
DBLP DOI BibTeX RDF |
|
18 | Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn |
Towards System Integrity Protection with Graph-Based Policy Analysis. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Derek Gordon Murray, Steven Hand 0001 |
Privilege separation made easy: trusting small libraries not big processes. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
libraries, virtualisation, disaggregation |
18 | Heidar Pirzadeh, Danny Dubé |
VEP: a virtual machine for extended proof-carrying code. |
VMSec |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, proof-carrying code |
18 | Anbang Ruan, Qingni Shen, Yuanyou Yin |
A Generalized Trusted Virtualized Platform Architecture. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Tappan Morris, M. Frans Kaashoek |
Alpaca: extensible authorization for distributed services. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
security, cryptography, authorization, theorem-proving, logic |
18 | Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama |
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Hermann Härtig, Michael Hohmuth, Norman Feske, Christian Helmuth, Adam Lackorzynski, Frank Mehnert, Michael Peter |
The Nizza secure-system architecture. |
CollaborateCom |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Martins, Paulo Jorge Paiva de Sousa, António Casimiro, Paulo Veríssimo |
Dependable Adaptive Real-Time Applications in Wormhole-based Systems. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
18 | António Casimiro, Paulo Veríssimo |
Generic Timing Fault Tolerance using a Timely Computing Base. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Haruna R. Isa, William R. Shockley, Cynthia E. Irvine |
A Multi-Threading Architecture for Multilevel Secure Transaction Processing. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Simon N. Foley, Li Gong, Xiaolei Qian |
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
18 | Roshan K. Thomas, Ravi S. Sandhu |
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Replicated architecture, writeup, serial correctness, signaling channels, object-oriented databases, message-filtering |