Sciweavers

2 search results - page 1 / 1
» Overshadow: a virtualization-based approach to retrofitting ...
Sort
View
114
Voted
ASPLOS
2008
ACM
15 years 7 days ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
70
Voted
USS
2008
15 years 17 days ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel