SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes A Seshadri, M Luk, N Qu, A Perrig Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 987 | 2007 |
TrustVisor: Efficient TCB reduction and attestation JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig 2010 IEEE Symposium on Security and Privacy, 143-158, 2010 | 847 | 2010 |
Systems and methods for preventing unauthorized modification of an operating system A Seshadri, N Qu, A Perrig US Patent 8,578,483, 2013 | 234 | 2013 |
Lockdown: Towards a safe and practical architecture for security applications on commodity platforms A Vasudevan, B Parno, N Qu, VD Gligor, A Perrig Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012 | 90* | 2012 |
Methods and apparatuses for user-verifiable trusted path in the presence of malware JM McCune, AM Perrig, A Datta, VD Gligor, N Qu US Patent 8,832,778, 2014 | 84 | 2014 |
Xtrec: Secure real-time execution trace recording on commodity platforms A Vasudevan, N Qu, A Perrig 2011 44th Hawaii International Conference on System Sciences, 1-10, 2011 | 47 | 2011 |
Methods and apparatuses for user-verifiable execution of security-sensitive code JM McCune, AM Perrig, A Datta, VD Gligor, Y Li, BJ Parno, A Vasudevan, ... US Patent 8,627,414, 2014 | 40 | 2014 |
Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor J Franklin, A Seshadri, N Qu, S Chaki, A Datta Technical Report CMU-CyLab-08-008, 2008 | 40 | 2008 |
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture A Vasudevan, JM McCune, N Qu, L Van Doorn, A Perrig International Conference on Trust and Trustworthy Computing, 141-165, 2010 | 36 | 2010 |
Lsm-based secure system monitoring using kernel protection schemes T Isohara, K Takemori, Y Miyake, N Qu, A Perrig 2010 International Conference on Availability, Reliability and Security, 591-596, 2010 | 22 | 2010 |
Using uncacheable memory to improve unity linux performance N Qu, X Gou, X Cheng Proceedings of the 6th Annual Workshop on the Interaction between Operating …, 2005 | 7 | 2005 |
Characterizing the d-TLB Behavior of Typical Applications on Network Computer N Qu, P Yuan, X Guan ACTA SCIENTIARUM NATURALIUM-UNIVERSITATIS PEKINENSIS 43 (1), 85, 2007 | 5 | 2007 |
Unichos: a full system simulator for thin client platform N Qu, Y Zhao, X Guan, X Cheng Proceedings of the 2007 ACM symposium on Applied computing, 1552-1556, 2007 | 4 | 2007 |
A retargetable full system simulator for thin client platform Q Ning, Z Yulai, G Xuetao, C Xu Chinese Journal of Electronics 16 (3), 401-405, 2007 | 2 | 2007 |
Remote Attestation for HDD Files using Kernel Protection Mechanism K Takemori, A Perrig, N Qu, Y Miyake 2010 IEEE International Conference on Communications, 1-6, 2010 | 1 | 2010 |
SSDC: A Split Data Cache Design for Sequential Access Intensive Applications S LIU, X GOU, N QU, X LI, X CHENG 北京大学学报 (自然科学版) 44 (3), 2008 | 1 | 2008 |
Gisp: A transparent superpage support framework for linux N Qu, Y Zheng, W Cao, X Cheng 2007 IEEE International Conf. on Application-specific Systems, Architectures …, 2007 | 1 | 2007 |
Fremgangsmåder og apparater til brugerverificerbar sikker sti i tilstedeværelsen af malware JM Mccune, AM Perrig, A Datta, VD Gilgor, N Qu | | 2019 |
Attacking, Repairing, and Verifying SecVisor: A Retrospective on the Security of a Hypervisor (CMU-CyLab-08-008) J Franklin, A Seshadri, N Qu, S Chaki, A Datta Carnegie Mellon University, 2008 | | 2008 |