Martin Hell, Linus Karlsson, B. Smeets, Jelena Mirosavljevic
{"title":"Using TPM Secure Storage in Trusted High Availability Systems","authors":"Martin Hell, Linus Karlsson, B. Smeets, Jelena Mirosavljevic","doi":"10.1007/978-3-319-27998-5_16","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_16","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li
{"title":"Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set","authors":"Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li","doi":"10.1007/978-3-319-27998-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_9","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs","authors":"Gaoshou Zhai, Tao Guo, Jie Huang","doi":"10.1007/978-3-319-27998-5_19","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_19","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guangjun Fan, Yongbin Zhou, Hailong Zhang, D. Feng
{"title":"Template Attacks Based on Priori Knowledge","authors":"Guangjun Fan, Yongbin Zhou, Hailong Zhang, D. Feng","doi":"10.1007/978-3-319-27998-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_22","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123851819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sampsa Rauti, S. Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, S. Hyrynsalmi, V. Leppänen
{"title":"Diversification of System Calls in Linux Binaries","authors":"Sampsa Rauti, S. Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, S. Hyrynsalmi, V. Leppänen","doi":"10.1007/978-3-319-27998-5_2","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng
{"title":"DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes","authors":"Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng","doi":"10.1007/978-3-319-27998-5_21","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_21","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage","authors":"Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia","doi":"10.1007/978-3-319-27998-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}