Jonathan McCune
Jonathan McCune
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
8852008
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
7252010
Seeing-is-believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005
7172005
VIPER: Verifying the integrity of peripherals' firmware
Y Li, JM McCune, A Perrig
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2082011
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
1962010
Detection of denial-of-message attacks on sensor network broadcasts
JM McCune, E Shi, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 64-78, 2005
1772005
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
1532012
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1422013
Device-enabled authorization in the Grey system
L Bauer, S Garriss, JM McCune, MK Reiter, J Rouse, P Rutenbar
International Conference on Information Security, 431-445, 2005
1382005
Shamon: A system for distributed mandatory access control
JM McCune, T Jaeger, S Berger, R Caceres, R Sailer
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006
1342006
Minibox: A two-way sandbox for x86 native code
Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry
2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14), 409-420, 2014
1252014
Memoir: Practical state continuity for protected modules
B Parno, JR Lorch, JR Douceur, J Mickens, JM McCune
2011 IEEE Symposium on Security and Privacy, 379-394, 2011
1222011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1182010
CLAMP: Practical prevention of large-scale data leaks
B Parno, JM McCune, D Wendlandt, DG Andersen, A Perrig
2009 30th IEEE Symposium on Security and Privacy, 154-169, 2009
1122009
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
982008
How low can you go? Recommendations for hardware-supported minimal TCB code execution
JM McCune, B Parno, A Perrig, MK Reiter, A Seshadri
ACM SIGOPS Operating Systems Review 42 (2), 14-25, 2008
952008
A study of mass-mailing worms
C Wong, S Bielski, JM McCune, C Wang
Proceedings of the 2004 ACM workshop on Rapid malcode, 1-10, 2004
922004
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
912013
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
International conference on trust and trustworthy computing, 159-178, 2012
912012
Bootstrapping trust in modern computers
B Parno, JM McCune, A Perrig
Springer Science & Business Media, 2011
912011
The system can't perform the operation now. Try again later.
Articles 1–20