Design and implementation of a TCG-based integrity measurement architecture. R Sailer, X Zhang, T Jaeger, L Van Doorn USENIX Security symposium 13 (2004), 223-238, 2004 | 1656 | 2004 |
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 415 | 2010 |
Managing security of virtual machine images in a cloud environment J Wei, X Zhang, G Ammons, V Bala, P Ning Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009 | 389 | 2009 |
Methods and arrangements for unified program analysis TR Jaeger, L Koved, L Zeng, X Zhang US Patent 7,493,602, 2009 | 274 | 2009 |
System support for automatic profiling and optimization X Zhang, Z Wang, N Gloy, JB Chen, MD Smith ACM SIGOPS Operating Systems Review 31 (5), 15-26, 1997 | 270 | 1997 |
Attestation-based policy enforcement for remote access R Sailer, T Jaeger, X Zhang, L Van Doorn Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 240 | 2004 |
XenSocket: A high-throughput interdomain transport for virtual machines X Zhang, S McIntosh, P Rohatgi, JL Griffin Middleware 2007: ACM/IFIP/USENIX 8th International Middleware Conference …, 2007 | 224 | 2007 |
Analyzing Integrity Protection in the {SELinux} Example Policy T Jaeger, R Sailer, X Zhang 12th USENIX Security Symposium (USENIX Security 03), 2003 | 221 | 2003 |
Use of snapshots to reduce risk in migration to a standard virtualized environment V Bala, K Bhattacharya, T Diethelm, P Jayachandran, L Renganarayana, ... US Patent 9,092,837, 2015 | 219 | 2015 |
Using {CQUAL} for static analysis of authorization hook placement X Zhang, A Edwards, T Jaeger 11th USENIX Security Symposium (USENIX Security 02), 2002 | 202 | 2002 |
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence C Kil, EC Sezer, AM Azab, P Ning, X Zhang 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 196 | 2009 |
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms AM Azab, P Ning, X Zhang Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 194 | 2011 |
HIMA: A hypervisor-based integrity measurement agent AM Azab, P Ning, EC Sezer, X Zhang 2009 Annual Computer Security Applications Conference, 461-470, 2009 | 178 | 2009 |
Encore: Exploiting system environment and correlation information for misconfiguration detection J Zhang, L Renganarayana, X Zhang, N Ge, V Bala, T Xu, Y Zhou Proceedings of the 19th international conference on Architectural support …, 2014 | 176 | 2014 |
Parallel garbage collection for shared memory multiprocessors CH Flood, D Detlefs, N Shavit, X Zhang Java (TM) Virtual Machine Research and Technology Symposium (JVM 01), 2001 | 165 | 2001 |
The case for application-specific benchmarking M Seltzer, D Krinsky, K Smith, X Zhang Proceedings of the Seventh Workshop on Hot Topics in Operating Systems, 102-107, 1999 | 157 | 1999 |
AutoISES: Automatically Inferring Security Specification and Detecting Violations. L Tan, X Zhang, X Ma, W Xiong, Y Zhou USENIX Security Symposium, 379-394, 2008 | 147 | 2008 |
Migration to managed clouds K Bhattacharya, F Graf, MA Markley, BM Pfitzmann, M Schlatter, HC Thio, ... US Patent 9,692,632, 2017 | 142 | 2017 |
Secure coprocessor-based intrusion detection X Zhang, L Van Doorn, T Jaeger, R Perez, R Sailer Proceedings of the 10th workshop on ACM SIGOPS European workshop, 239-242, 2002 | 140 | 2002 |
Policy management using access control spaces T Jaeger, X Zhang, A Edwards ACM Transactions on Information and System Security (TISSEC) 6 (3), 327-364, 2003 | 131 | 2003 |