@InProceedings{LMNPBD2014, author = {Yanlin Li, Jonathan M. {McCune}, James Newsome, Adrian Perrig, Brandon Baker, and Will Drewry}, title = "{MiniBox: A Two-Way Sandbox for x86 Native Code}", booktitle = {Proceedings of the USENIX Annual Technical Conference}, month = jun, year = 2014, }@InProceedings{VCJMND2013, author = {Amit Vasudevan and Sagar Chaki and Limin Jia and Jonathan {McCune} and James Newsome and Anupam Datta}, title = {Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = may, year = 2013 }@InProceedings{OGMNPV2013, author = {Emmanuel Owusu and Jorge Guajardo and Jonathan Mc{C}une and Jim Newsome and Adrian Perrig and Amit Vasudevan}, title = "{OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms}", booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)}, month = nov, year = 2013 }@InProceedings{FaLiKiMcPe2013, author = {Michael Farb and Yue-Hsun Lin and Tiffany Hyun-Jin Kim and Jonathan M. Mc{C}une and Adrian Perrig}, title = {SafeSlinger: Easy-to-Use and Secure Public-Key Exchange}, booktitle = {Proceedings of ACM Conference on Mobile Computing and Networking (MobiCom)}, month = sep, year = 2013 }@InProceedings{VaOwZhNeMc2012, author = {Amit Vasudevan and Emmanuel Owusu and Zongwei Zhou and James Newsome and Jonathan M. {McCune}}, title = {Trustworthy Execution on Mobile Devices: What security properties can my mobile platform give me?}, booktitle = {Proceedings of the 5th International Conference on Trust and Trustworthy Computing (Trust 2012)}, month = jun, year = 2012 }@InProceedings{ZhGlNeMc2012, author = {Zongwei Zhou and Virgil D. Gligor and James Newsome and Jonathan M. {McCune}}, title = {Building Verifiable Trusted Path on Commodity x86 Computers}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = may, year = 2012 }@InProceedings{VaMcNePevDo2012, author = {Amit Vasudevan and Jonathan {McCune} and James Newsome and Adrian Perrig and Leendert van Doorn}, title = {{CARMA}: A Hardware Tamper-Resistant Isolated Execution Environment on Commodity x86 Platforms}, booktitle = {Proceedings of the {ACM} Symposium on Information, Computer and Communications Security ({ASIACCS})}, month = may, year = 2012 }@inproceedings{FrChDaMcVa2012, author = {Jason Franklin and Sagar Chaki and Anupam Datta and Jonathan M. {McCune} and Amit Vasudevan}, title = {Parametric Verification of Address Space Separation}, booktitle = {Proceedings of the Conference on Principles of Security and Trust}, month = mar, year = 2012 }@InProceedings{LiMcPe2011, author = {Yanlin Li and Jonathan M. Mc{C}une and Adrian Perrig}, title = {{VIPER}: Verifying the Integrity of PERipherals' Firmware}, booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)}, month = oct, year = 2011 }@InProceedings{FiMcSaWi2011, author = {Atanas Filyanov and Jonathan M. Mc{C}une and Ahmad-Reza Sadeghi and Marcel Winandy}, title = {Uni-directional Trusted Path: Transaction Confirmation on Just One Device}, booktitle = {Proceedings of the IEEE/IFIP Conference on Dependable Systems and Networks}, month = jun, year = 2011 }@InProceedings{PLDMM2011, author = {Bryan Parno and Jacob R. Lorch and John R. Douceur and James Mickens and Jonathan M. Mc{C}une}, title = {Memoir: Practical State Continuity for Protected Modules}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = may, year = 2011 }@InProceedings{LiMcRe2011, author = {Alana Libonati and Jonathan M. Mc{C}une and Michael K. Reiter}, title = {Usability Testing a Malware-Resistant Input Mechanism}, booktitle = {Proceedings of the Symposium on Network and Distributed Systems Security (NDSS)}, year = 2011, month = feb }@article{LSHMWKLPSY2010, author = {Yue-Hsun Lin and Ahren Studer and Yao-Hsin Chen and Hsu-Chun Hsiao and Li-Hsiang Kuo and Jason Lee and Jonathan M. {McCune} and King-Hang Wang and Maxwell Krohn and Phen-Lan Lin and Adrian Perrig and Hung-Min Sun and Bo-Yin Yang}, title = {{SPATE}: Small-Group {PKI}-Less Authenticated Trust Establishment}, journal ={IEEE Transactions on Mobile Computing}, volume = {9}, issn = {1536-1233}, year = {2010}, pages = {1666-1681}, doi = {http://doi.ieeecomputersociety.org/10.1109/TMC.2010.150}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }@InProceedings{LiMcPeSBAP2010, author = {Yanlin Li and Jonathan M. Mc{C}une and Adrian Perrig}, title = {{SBAP}: {S}oftware-{B}ased {A}ttestation for {P}eripherals}, booktitle = {Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (Trust 2010)}, month = jun, year = 2010, }@InProceedings{VaMcQuLePeIPH2010, author = {Amit Vasudevan and Jonathan M. Mc{C}une and Ning Qu and Leendert van Doorn and Adrian Perrig}, title = {{R}equirements for an {I}ntegrity-{P}rotected {H}ypervisor on the x86 {H}ardware {V}irtualized {A}rchitecture}, booktitle = {Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (Trust 2010)}, month = jun, year = 2010, }@InProceedings{MLQZDGP2010, author = {Jonathan M. Mc{C}une and Yanlin Li and Ning Qu and Zongwei Zhou and Anupam Datta and Virgil Gligor and Adrian Perrig}, title = {{TrustVisor}: Efficient {TCB} Reduction and Attestation}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = may, year = 2010 }@InProceedings{PaMcPe2010, author = {Bryan Parno and Jonathan M. Mc{C}une and Adrian Perrig}, title = {Bootstrapping Trust in Commodity Computers}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = may, year = 2010 }@InProceedings{ScBrMc2010, author = {Edward J. Schwartz and David Brumley and Jonathan M. Mc{C}une}, title = {A Contractual Anonymity System}, booktitle = {Proceedings of the Symposium on Network and Distributed Systems Security (NDSS)}, year = 2010, month = feb, url = {http://www.ece.cmu.edu/~jmmccune/papers/ScBrMc2010.pdf} }@Article{McCPerRei2009a, author = {Jonathan M. Mc{C}une and Adrian Perrig and Michael K. Reiter}, title = {Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication}, journal = {International Journal of Security and Networks Special Issue on Secure Spontaneous Interaction}, year = 2009, volume = 4, number = {1--2}, pages = {43--56} }@InProceedings{LSHMWKLPSY2009, author = {Yue-Hsun Lin and Ahren Studer and Hsu-Chin Hsiao and Jonathan M. Mc{C}une and King-Hang Wang and Maxwell Krohn and Phen-Lan Lin and Adrian Perrig and Hung-Min Sun and Bo-Yin Yang}, title = {{SPATE}: Small-group {PKI}-less Authenticated Trust Establishment}, booktitle = {Proceedings of the International Conference on Mobile Systems, Applications and Services (MobiSys)}, month = june, year = 2009 }@InProceedings{PMWAP2009, author = {Bryan Parno and Jonathan M. Mc{C}une and Dan Wendlandt and David G. Andersen and Adrian Perrig}, title = {CLAMP: Practical Prevention of Large-Scale Data Leaks}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = may, year = 2009 }@InProceedings{McCPerRei2009b, author = {Jonathan M. Mc{C}une and Adrian Perrig and Michael K. Reiter}, title = {Safe Passage for Passwords and Other Sensitive Data}, booktitle = {Proceedings of the Symposium on Network and Distributed Systems Security (NDSS)}, year = 2009, month = feb }@Article{FrMcLuSePeVa2008, author = {Jason Franklin and Mark Luk and Jonathan M. Mc{C}une and Arvind Seshadri and Adrian Perrig and Leendert Van Doorn}, title = {Remote Detection of Virtual Machine Monitors with Fuzzy Benchmarking}, journal = {ACM SIGOPS Operating System Review Special Edition on Computer Forensics}, year = 2008, volume = 42, number = 3, pages = {83--92}, month = apr}@InProceedings{ChChKuLaMcStPeYaWu2008, author = {Chia-Hsin Owen Chen and Chung-Wei Chen and Cynthia Kuo and Yan-Hao Lai and Jonathan M. Mc{C}une and Ahren Studer and Adrian Perrig and Bo-Yin Yang and Tzong-Chen Wu}, title = {{GAnGS}: Gather, Authenticate, and Group Securely}, booktitle = {Proceedings of the International Conference on Mobile Computing and Networking (Mobicom)}, year = 2008, month = sep, url = {http://www.ece.cmu.edu/~jmmccune/papers/GAnGS_mobicom08.pdf} }@InProceedings{McPaPeReIs2008, author = {Jonathan M. Mc{C}une and Bryan Parno and Adrian Perrig and Michael K. Reiter and Hiroshi Isozaki}, title = {Flicker: An Execution Infrastructure for {TCB} Minimization}, booktitle = {Proceedings of the ACM European Conference in Computer Systems (EuroSys)}, year = 2008, month = apr }@InProceedings{McPaPeReSe2008, author = {Jonathan M. Mc{C}une and Bryan Parno and Adrian Perrig and Michael K. Reiter and Arvind Seshadri}, title = {How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution}, booktitle = {Proceedings of the 2008 Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)}, year = 2008, month = mar }@InProceedings{McPeSeva2007, author = {Jonathan M. Mc{C}une and Adrian Perrig and Arvind Seshadri and Leendert van Doorn}, title = {Turtles All the Way Down: Research Challenges in User-Based Attestation}, booktitle = {Proceedings of the USENIX Workshop on Hot Topics in Security}, year = 2007, month = aug, url = {http://www.ece.cmu.edu/~jmmccune/papers/mccune_perrig_seshadri_vandoorn_hotsec07.pdf} }@InProceedings{McPaPeReSe2007, author = {Jonathan M. Mc{C}une and Bryan Parno and Adrian Perrig and Michael K. Reiter and Arvind Seshadri}, title = {Minimal {TCB} Code Execution (Extended Abstract)}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, year = 2007, month = may, url = {http://www.ece.cmu.edu/~jmmccune/papers/mccune_parno_perrig_reiter_seshadri_mintcb.pdf} }@InProceedings{MBCJS2006, author = {Jonathan M. Mc{C}une and Stefan Berger and Ram\'{o}n C\'{a}ceres and Trent Jaeger and Reiner Sailer}, title = {Shamon: A System for Distributed Mandatory Access Control}, booktitle = {Proceedings of the Annual Computer Security Applications Conference}, year = 2006, month = dec, url = {http://www.ece.cmu.edu/~jmmccune/papers/mccunej_shamon.pdf} }@InProceedings{McCPerRei2006, author = {Jonathan M. Mc{C}une and Adrian Perrig and Michael K. Reiter}, title = {Bump in the Ether: A Framework for Securing Sensitive User Input}, booktitle = {Proceedings of the USENIX Annual Technical Conference}, year = 2006, month = jun, url = {http://www.ece.cmu.edu/~jmmccune/papers/mccunej_bite.pdf} }@InProceedings{bauer+:grey, author = {Lujo Bauer and Scott Garriss and Jonathan M. Mc{C}une and Michael K. Reiter and Jason Rouse and Peter Rutenbar}, title = {Device-enabled authorization in the {G}rey system}, booktitle = {Proceedings of the 8th Information Security Conference (ISC'05)}, month = sep, year = 2005, note = {An extended version of this paper appears as CMU Computer Science Department Tech Report 05-111.}, url = {http://www.ece.cmu.edu/~lbauer/papers/grey-isc05.pdf} }@InProceedings{McCPerRei2005, author = {Jonathan M. Mc{C}une and Adrian Perrig and Michael K. Reiter}, title = {Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, year = 2005, month = may, url = {http://www.ece.cmu.edu/~jmmccune/papers/mccunej_believing.pdf} }@InProceedings{McShPeRe2005, author = {Jonathan Mc{C}une and Elaine Shi and Adrian Perrig and Michael K. Reiter}, title = {Detection of Denial-of-Message Attacks on Sensor Network Broadcasts}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, year = 2005, month = may, url = {http://www.ece.cmu.edu/~jmmccune/papers/mccunej_broadcast.pdf} }@InProceedings{wong04worm, author = {Cynthia Wong and Stan Bielski and Jonathan M. Mc{C}une and Chenxi Wang}, title = {A Study of Mass-mailing Worms}, booktitle = {Proceedings of the ACM Workshop on Rapid Malcode (WORM)}, year = 2004, url = {http://www.ece.cmu.edu/~jmmccune/papers/worm04.pdf} }