The SCEAS System
Navigation Menu

Search the dblp DataBase


Tal Garfinkel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tal Garfinkel, Mendel Rosenblum, Dan Boneh
    Flexible OS Support and Applications for Trusted Computing. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:145-150 [Conf]
  2. Tal Garfinkel
    Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  3. Tal Garfinkel, Ben Pfaff, Mendel Rosenblum
    Ostia: A Delegating Architecture for Secure System Call Interposition. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  4. Tal Garfinkel, Mendel Rosenblum
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  5. Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
    Terra: a virtual machine-based platform for trusted computing. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:193-206 [Conf]
  6. Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum
    Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:321-336 [Conf]
  7. Mendel Rosenblum, Tal Garfinkel
    Virtual Machine Monitors: Current Technology and Future Trends. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:5, pp:39-47 [Journal]
  8. Ben Pfaff, Tal Garfinkel, Mendel Rosenblum
    Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]

  9. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. [Citation Graph (, )][DBLP]

  10. Compatibility Is Not Transparency: VMM Detection Myths and Realities. [Citation Graph (, )][DBLP]

  11. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. [Citation Graph (, )][DBLP]

  12. Data lifetime is a systems problem. [Citation Graph (, )][DBLP]

  13. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments. [Citation Graph (, )][DBLP]

  14. Towards Application Security on Untrusted Operating Systems. [Citation Graph (, )][DBLP]

  15. Multi-stage replay with crosscut. [Citation Graph (, )][DBLP]

  16. Reducing shoulder-surfing by using gaze-based password entry. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002