Design and implementation of a TCG-based integrity measurement architecture. R Sailer, X Zhang, T Jaeger, L Van Doorn USENIX Security symposium 13 (2004), 223-238, 2004 | 1658 | 2004 |
SWATT: Software-based attestation for embedded devices A Seshadri, A Perrig, L Van Doorn, P Khosla IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 272-282, 2004 | 992 | 2004 |
vTPM: virtualizing the trusted platform module R Perez, R Sailer, L van Doorn Proc. 15th Conf. on USENIX Security Symposium, 305-320, 2006 | 849 | 2006 |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005 | 568 | 2005 |
Building a MAC-based security architecture for the Xen open-source hypervisor R Sailer, T Jaeger, E Valdez, R Caceres, R Perez, S Berger, JL Griffin, ... 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-285, 2005 | 428 | 2005 |
Building the IBM 4758 secure coprocessor JG Dyer, M Lindemann, R Perez, R Sailer, L Van Doorn, SW Smith Computer 34 (10), 57-66, 2001 | 403 | 2001 |
Bind: A fine-grained attestation service for secure distributed systems E Shi, A Perrig, L Van Doorn 2005 IEEE Symposium on Security and Privacy (S&P'05), 154-168, 2005 | 384 | 2005 |
SCUBA: Secure code update by attestation in sensor networks A Seshadri, M Luk, A Perrig, L Van Doorn, P Khosla Proceedings of the 5th ACM workshop on Wireless security, 85-94, 2006 | 343 | 2006 |
A practical guide to trusted computing D Challener, K Yoder, R Catherman, D Safford, L Van Doorn Pearson Education, 2007 | 260 | 2007 |
Attestation-based policy enforcement for remote access R Sailer, T Jaeger, X Zhang, L Van Doorn Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 240 | 2004 |
sHype: Secure hypervisor approach to trusted virtualized systems R Sailer, E Valdez, T Jaeger, R Perez, L Van Doorn, JL Griffin, S Berger, ... Techn. Rep. RC23511 5, 2005 | 227 | 2005 |
Integrating operating systems and run-time systems LP Van Doorn US Patent 6,546,546, 2003 | 177 | 2003 |
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of ACM Symposium on Operating Systems Principles (SOSP) 173, 10-1145, 2005 | 176 | 2005 |
Secure coprocessor-based intrusion detection X Zhang, L Van Doorn, T Jaeger, R Perez, R Sailer Proceedings of the 10th workshop on ACM SIGOPS European workshop, 239-242, 2002 | 140 | 2002 |
Utilizing IOMMUs for virtualization in Linux and Xen M Ben-Yehuda, J Mason, J Xenidis, O Krieger, L Van Doorn, J Nakajima, ... OLS’06: The 2006 Ottawa Linux Symposium, 71-86, 2006 | 132 | 2006 |
Trusted virtual domains: Toward secure distributed services JL Griffin, T Jaeger, R Perez, R Sailer, L Van Doorn, R Caceres Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability …, 2005 | 126 | 2005 |
Trustworthy and personalized computing on public kiosks S Garriss, R Cáceres, S Berger, R Sailer, L van Doorn, X Zhang Proceedings of the 6th international conference on Mobile systems …, 2008 | 125 | 2008 |
The price of safety: Evaluating IOMMU performance M Ben-Yehuda, J Xenidis, M Ostrowski, K Rister, A Bruemmer, ... The Ottawa Linux Symposium, 9-20, 2007 | 117 | 2007 |
The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer TW Arnold, LP Van Doorn IBM Journal of Research and Development 48 (3.4), 475-487, 2004 | 106 | 2004 |
Method and apparatus for caching of page translations for virtual machines V Uhlig, L Van Doorn US Patent 8,078,827, 2011 | 103 | 2011 |