21 papers:
STOC-2014-MillerS #protocol #quantum #robust #using- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
OSDI-2014-BaumannPH- Shielding Applications from an Untrusted Cloud with Haven (AB, MP, GCH), pp. 267–283.
ASPLOS-2013-CheckowayS #api #why- Iago attacks: why the system call API is a bad untrusted RPC interface (SC, HS), pp. 253–264.
ASPLOS-2013-HofmannKDLW #named #operating system- InkTag: secure applications on an untrusted operating system (OSH, SK, AMD, MZL, EW), pp. 265–278.
HPCA-2013-XiaLC #architecture #physics #virtual machine- Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
OSDI-2012-GiffinLSTMMR #named #privacy #web- Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
DAC-2010-Potkonjak #synthesis #tool support #using- Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
OSDI-2010-FeldmanZFF #collaboration #named #using- SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
AdaEurope-2006-NarayananKBK #execution- Secure Execution of Computations in Untrusted Hosts (SHKN, MTK, RRB, IK), pp. 106–118.
ASE-2005-Dolstra #deployment- Secure sharing between untrusted users in a transparent source/binary deployment model (ED), pp. 154–163.
OSDI-2004-LiKMS #repository- Secure Untrusted Data Repository (SUNDR) (JL, MNK, DM, DS), pp. 121–136.
ICALP-2003-BugliesiCPS #network- Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
ESEC-FSE-2003-LeeA #component- Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
SOSP-2003-LieTH #hardware #implementation #operating system- Implementing an untrusted operating system on trusted hardware (DL, CAT, MH), pp. 178–192.
SOSP-2003-PatelWWLS #mobile #protocol #using- Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
SOSP-2003-SekarVBBD #approach #execution- Model-carrying code: a practical approach for safe execution of untrusted applications (RS, VNV, SB, SB, DCD), pp. 15–28.
LICS-2003-NeculaS #framework #generative- A Sound Framework for Untrusted Verification-Condition Generators (GCN, RRS), pp. 248–260.
VLDB-2002-BouganimP #data access- Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
POPL-2001-NeculaR- Oracle-based checking of untrusted software (GCN, SPR), pp. 142–154.
SOSP-2001-ZdancewicZNM #clustering- Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
OSDI-2000-MaheshwariVS #database #how- How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.