Leendert van Doorn

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Leendert van Doorn authored at least 34 papers between 1994 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
HotChips security tutorial.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

Secure systems design.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

2012
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2010
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

2008
Towards Sound Detection of Virtual Machines.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Virtualization and Hardware-Based Security.
IEEE Secur. Priv., 2008

Trustworthy and personalized computing on public kiosks.
Proceedings of the 6th International Conference on Mobile Systems, 2008

A Practical Guide to Trusted Computing.
Pearson, ISBN: 978-0-13-239842-8, 2008

2007
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Proceedings of the Malware Detection, 2007

Towards Trustworthy Kiosk Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Turtles All the Way Down: Research Challenges in User-Based Attestation.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Trusted computing challenges.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
Externally verifiable code execution.
Commun. ACM, 2006

SCUBA: Secure Code Update By Attestation in sensor networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Hardware virtualization trends.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

vTPM: Virtualizing the Trusted Platform Module.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

2005
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Autonomic 802.11 Wireless LAN Security Auditing.
IEEE Secur. Priv., 2004

The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer.
IBM J. Res. Dev., 2004

Design and Implementation of a TCG-based Integrity Measurement Architecture.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

SWATT: SoftWare-based ATTestation for Embedded Devices.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Secure bootstrap is not enough: shoring up the trusted computing base.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

Attestation-based policy enforcement for remote access.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2002
Secure coprocessor-based intrusion detection.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

2001
Building the IBM 4758 Secure Coprocessor.
Computer, 2001

Guest Editors' Introduction: Embedded Security: Challenges and Concerns.
Computer, 2001

2000
A Secure Java Virtual Machine.
Proceedings of the 9th USENIX Security Symposium, 2000

1999
Secure Network Objects.
Proceedings of the Secure Internet Programming, 1999

1998
Internet security incidents, a survey within Dutch organizations.
Comput. Secur., 1998

Internet Security Incidents, a Survey within Dutch Organisations.
Proceedings of WebNet 98, 1998

1995
Paramecium: an extensible object-based kernel.
Proceedings of the Fifth Workshop on Hot Topics in Operating Systems, 1995

1994
Using Active Messages to Support Shared Objects.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994


  Loading...