Jonathan McCune
Jonathan McCune
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
8342008
Seeing-is-believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005
6792005
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
6702010
VIPER: verifying the integrity of PERipherals' firmware
Y Li, JM McCune, A Perrig
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1832011
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
1832010
Detection of denial-of-message attacks on sensor network broadcasts
JM McCune, E Shi, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 64-78, 2005
1762005
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
1392012
Device-enabled authorization in the Grey system
L Bauer, S Garriss, JM McCune, MK Reiter, J Rouse, P Rutenbar
International Conference on Information Security, 431-445, 2005
1332005
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1242013
Shamon: A system for distributed mandatory access control
JM McCune, T Jaeger, S Berger, R Caceres, R Sailer
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006
1212006
Minibox: A two-way sandbox for x86 native code
Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry
2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14), 409-420, 2014
1132014
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1112010
Memoir: Practical state continuity for protected modules
B Parno, JR Lorch, JR Douceur, J Mickens, JM McCune
2011 IEEE Symposium on Security and Privacy, 379-394, 2011
1102011
CLAMP: Practical prevention of large-scale data leaks
B Parno, JM McCune, D Wendlandt, DG Andersen, A Perrig
2009 30th IEEE Symposium on Security and Privacy, 154-169, 2009
1082009
GAnGS: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
942008
How low can you go? Recommendations for hardware-supported minimal TCB code execution
JM McCune, B Parno, A Perrig, MK Reiter, A Seshadri
ACM SIGOPS Operating Systems Review 42 (2), 14-25, 2008
932008
A study of mass-mailing worms
C Wong, S Bielski, JM McCune, C Wang
Proceedings of the 2004 ACM workshop on Rapid malcode, 1-10, 2004
882004
Safe passage for passwords and other sensitive data
JMMCA Perrig, MK Reiter
Proceeding of the 16th annual network and distributed system security Symposium, 2009
852009
Minimal TCB code execution
JM McCune, B Parno, A Perrig, MK Reiter, A Seshadri
2007 IEEE Symposium on Security and Privacy (SP'07), 267-272, 2007
842007
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
International Conference on Trust and Trustworthy Computing, 159-178, 2012
832012
The system can't perform the operation now. Try again later.
Articles 1–20