ARM, TrustZone. http://www.arm.com/products/processors/technologies/trustzone.php, accessed April 2013.
VMWare. http://www.vmware.com/, accessed April 2013.
Xen. http://www.xen.org, accessed May 2013.
David Champagne. Scalable Security Architecture for Trusted Software. PhD thesis, Princeton University, 2010.
Google Scholar
David Champagne and Ruby B. Lee. Scalable architectural support for trusted software. In Proceedings of the 16th International Symposium on High Performance Computer Architecture, HPCA, pages 1–12, 2010.
Google Scholar
Jeffrey S. Dwoskin and Ruby B. Lee. Hardware-rooted trust for secure key management and transient trust. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ’07, pages 389–400, 2007.
Google Scholar
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, and Steve Weingart. Building the IBM 4758 Secure Coprocessor. Computer, 34:57–66, 2001.
Google Scholar
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. SIGOPS Oper. Syst. Rev., 37(5):193–206, 2003.
Google Scholar
Tal Garfinkel and Mendel Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings Network and Distributed Systems Security Symposium, pages 191–206, 2003.
Google Scholar
Ruby B. Lee, Peter Kwan, John Patrick McGregor, Jeffrey Dwoskin, and Zhenghong Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the International Symposium on Computer Architecture, ISCA, pages 2–13, 2005.
Google Scholar
Chunxiao Li, Anand Raghunathan, and Niraj K. Jha. Secure virtual machine execution under an untrusted management OS. In Proceedings Conference on Cloud Computing (CLOUD), pages 172–179, 2010.
Google Scholar
David Lie, John C. Mitchell, Chandramohan A. Thekkath, and Mark Horowitz. Specifying and verifying hardware for tamper-resistant software. In Proceedings of Symposium on Security and Privacy, S&P, pages 166–177, 2003.
Google Scholar
Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, volume 5230 of Lecture Notes in Computer Science, pages 1–20. Springer Berlin Heidelberg, 2008.
Google Scholar
Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Van Doorn, John Linwood Griffin, Stefan Berger, Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Doorn, John Linwood, and Griffin Stefan Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, 2005.
Google Scholar
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SIGOPS Oper. Syst. Rev., 41(6):335–350, 2007.
Google Scholar
Monirul I. Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pages 477–487, 2009.
Google Scholar
Udo Steinberg and Bernhard Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In European Conference on Computer Systems, pages 209–222, 2010.
Google Scholar
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th annual International Conference on Supercomputing, ICS ’03, pages 160–171, 2003.
Google Scholar
Jakub Szefer. Architectures for Secure Cloud Computing Servers. PhD thesis, Princeton University, 2013.
Google Scholar
Jakub Szefer and Ruby B. Lee. A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing. In Proceedings of the Second International Workshop on Security and Privacy in Cloud Computing, SPCC, pages 248–252, 2011.
Google Scholar
Jakub Szefer and Ruby B. Lee. Architectural Support for Hypervisor-Secure Virtualization. In Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, pages 437–450, March 2012.
Google Scholar
Trusted Computing Group Trusted Platform Module main specification version 1.2, revision 94. http://www.trustedcomputinggroup.org/resources/tpm_main_specification, accessed April 2013.
Carl A. Waldspurger. Memory resource management in VMware ESX server. In 5th Symposium on Operating Systems Design and Implementation (OSDI), pages 181–194, 2002.
Google Scholar
Zhenghong Wang and Ruby B. Lee. New cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 34th annual International Symposium on Computer Architecture, ISCA ’07, pages 494–505, 2007.
Google Scholar
Zhenghong Wang and Ruby B. Lee. A novel cache architecture with enhanced performance and security. In Proceedings of the 41st annual IEEE/ACM International Symposium on Microarchitecture, MICRO 41, pages 83–93, 2008.
Google Scholar
Zhi Wang and Xuxian Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, S&P, pages 380–395, May 2010.
Google Scholar
Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS, pages 545–554, 2009.
Google Scholar