Jonathan M. McCune

According to our database1, Jonathan M. McCune authored at least 36 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Trustworthy Execution on Mobile Devices.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8190-4, 2014

MiniBox: A Two-Way Sandbox for x86 Native Code.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SafeSlinger: easy-to-use and secure public-key exchange.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Building Verifiable Trusted Path on Commodity x86 Computers.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Parametric Verification of Address Space Separation.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Bootstrapping Trust in Modern Computers.
Springer Briefs in Computer Science 10, Springer, ISBN: 978-1-4614-1460-5, 2011

Memoir: Practical State Continuity for Protected Modules.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Usability Testing a Malware-Resistant Input Mechanism.
Proceedings of the Network and Distributed System Security Symposium, 2011

Uni-directional trusted path: Transaction confirmation on just one device.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

VIPER: verifying the integrity of PERipherals' firmware.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

SBAP: Software-Based Attestation for Peripherals.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Bootstrapping Trust in Commodity Computers.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

TrustVisor: Efficient TCB Reduction and Attestation.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Contractual Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Seeing-Is-Believing: using camera phones for human-verifiable authentication.
IJSN, 2009

CLAMP: Practical Prevention of Large-Scale Data Leaks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Safe Passage for Passwords and Other Sensitive Data.
Proceedings of the Network and Distributed System Security Symposium, 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

2008
Towards Sound Detection of Virtual Machines.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Flicker: an execution infrastructure for tcb minimization.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Turtles All the Way Down: Research Challenges in User-Based Attestation.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Minimal TCB Code Execution.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Bump in the Ether: A Framework for Securing Sensitive User Input.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

Shamon: A System for Distributed Mandatory Access Control.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Device-Enabled Authorization in the Grey-System.
Proceedings of the Information Security, 8th International Conference, 2005

2004
A study of mass-mailing worms.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004


  Loading...