21 papers:
- STOC-2014-MillerS #protocol #quantum #robust #using
- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
- OSDI-2014-BaumannPH
- Shielding Applications from an Untrusted Cloud with Haven (AB, MP, GCH), pp. 267–283.
- ASPLOS-2013-CheckowayS #api #why
- Iago attacks: why the system call API is a bad untrusted RPC interface (SC, HS), pp. 253–264.
- ASPLOS-2013-HofmannKDLW #named #operating system
- InkTag: secure applications on an untrusted operating system (OSH, SK, AMD, MZL, EW), pp. 265–278.
- HPCA-2013-XiaLC #architecture #physics #virtual machine
- Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
- OSDI-2012-GiffinLSTMMR #named #privacy #web
- Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
- DAC-2010-Potkonjak #synthesis #tool support #using
- Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
- OSDI-2010-FeldmanZFF #collaboration #named #using
- SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
- AdaEurope-2006-NarayananKBK #execution
- Secure Execution of Computations in Untrusted Hosts (SHKN, MTK, RRB, IK), pp. 106–118.
- ASE-2005-Dolstra #deployment
- Secure sharing between untrusted users in a transparent source/binary deployment model (ED), pp. 154–163.
- OSDI-2004-LiKMS #repository
- Secure Untrusted Data Repository (SUNDR) (JL, MNK, DM, DS), pp. 121–136.
- ICALP-2003-BugliesiCPS #network
- Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
- ESEC-FSE-2003-LeeA #component
- Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
- SOSP-2003-LieTH #hardware #implementation #operating system
- Implementing an untrusted operating system on trusted hardware (DL, CAT, MH), pp. 178–192.
- SOSP-2003-PatelWWLS #mobile #protocol #using
- Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
- SOSP-2003-SekarVBBD #approach #execution
- Model-carrying code: a practical approach for safe execution of untrusted applications (RS, VNV, SB, SB, DCD), pp. 15–28.
- LICS-2003-NeculaS #framework #generative
- A Sound Framework for Untrusted Verification-Condition Generators (GCN, RRS), pp. 248–260.
- VLDB-2002-BouganimP #data access
- Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
- POPL-2001-NeculaR
- Oracle-based checking of untrusted software (GCN, SPR), pp. 142–154.
- SOSP-2001-ZdancewicZNM #clustering
- Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
- OSDI-2000-MaheshwariVS #database #how
- How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.