2018
DOI: 10.1007/978-3-030-03026-1_9
|View full text |Cite
|
Sign up to set email alerts
|

H-Verifier: Verifying Confidential System State with Delegated Sandboxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…In contrast to our prior work [31], which proposed a preliminary framework that describes the functionalities of key components with limited technical details, we extend it with comprehensive coverage, more technical details, and security analysis in this paper. The remainder of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast to our prior work [31], which proposed a preliminary framework that describes the functionalities of key components with limited technical details, we extend it with comprehensive coverage, more technical details, and security analysis in this paper. The remainder of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%