• Publications
  • Influence
Remote Attestation of Software and Execution-Environment in Modern Machines
TLDR
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Expand
  • 11
Preventing Execution of Unauthorized Native-Code Software
TLDR
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Expand
  • 5
Hypervisor-Based Protection of Code
TLDR
We propose a method that is based on cryptography and virtualization. Expand
  • 4
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
TLDR
We propose a hypervisor-based memory acquisition method that solves the two aforementioned deficiencies. Expand
  • 5
  • PDF
Modern Blue Pills and Red Pills
TLDR
The red pill and blue pill situation on Intel and AMD virtualizations circa 2018 and the eighth generation of core iX CPUs. Expand
  • 3
Trusted Computing and DRM
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that areExpand
  • 3
  • PDF
System for Executing Encrypted Native Programs
TLDR
This paper presents and compares two methodologies that perform just-in-time decryption: in-place and buffered execution. Expand
  • 2
Hypervisor-Based White Listing of Executables
TLDR
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. Expand
  • 1
Timing and Side Channel Attacks
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is aExpand
  • 1
System for Executing Encrypted Java Programs
TLDR
We present a system that allows encrypting and executing programs written for the Java Virtual Machine (JVM) (Lindholm et al., 2013). Expand
  • 1
  • PDF