Jonathan McCune
Jonathan McCune
Verified email at - Homepage
Cited by
Cited by
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
Seeing-is-believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005
VIPER: Verifying the integrity of peripherals' firmware
Y Li, JM McCune, A Perrig
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
Detection of denial-of-message attacks on sensor network broadcasts
JM McCune, E Shi, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 64-78, 2005
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
Memoir: Practical state continuity for protected modules
B Parno, JR Lorch, JR Douceur, J Mickens, JM McCune
2011 IEEE Symposium on Security and Privacy, 379-394, 2011
Device-enabled authorization in the Grey system
L Bauer, S Garriss, JM McCune, MK Reiter, J Rouse, P Rutenbar
International Conference on Information Security, 431-445, 2005
Shamon: A system for distributed mandatory access control
JM McCune, T Jaeger, S Berger, R Caceres, R Sailer
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006
{MiniBox}: A {Two-Way} Sandbox for x86 Native Code
Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry
2014 USENIX annual technical conference (USENIX ATC 14), 409-420, 2014
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
CLAMP: Practical prevention of large-scale data leaks
B Parno, JM McCune, D Wendlandt, DG Andersen, A Perrig
2009 30th IEEE Symposium on Security and Privacy, 154-169, 2009
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
Bootstrapping trust in modern computers
B Parno, JM McCune, A Perrig
Springer Science & Business Media, 2011
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
A study of mass-mailing worms
C Wong, S Bielski, JM McCune, C Wang
Proceedings of the 2004 ACM workshop on Rapid malcode, 1-10, 2004
How low can you go? Recommendations for hardware-supported minimal TCB code execution
JM McCune, B Parno, A Perrig, MK Reiter, A Seshadri
ACM SIGOPS Operating Systems Review 42 (2), 14-25, 2008
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20