Chapter Challenges in Bootstrapping Trust in Secure Hardware 2011 • SpringerBriefs in Computer Science • 10:41-50 Parno B, McCune JM, Perrig A
Chapter How Do We Make Sense of Platform State? 2011 • SpringerBriefs in Computer Science • 10:25-33 Parno B, McCune JM, Perrig A
Chapter Human Factors & Usability 2011 • SpringerBriefs in Computer Science • 10:61-72 Parno B, McCune JM, Perrig A
Chapter Implementing Trust Bootstrapping: Open Source Tools 2011 • SpringerBriefs in Computer Science • 10:59-60 Parno B, McCune JM, Perrig A
Chapter Limitations 2011 • SpringerBriefs in Computer Science • 10:73-74 Parno B, McCune JM, Perrig A
Conference Memoir: Practical state continuity for protected modules 2011 • IEEE Symposium on Security and Privacy: Proceedings • 379-394 Parno B, Lorch JR, Douceur JR, Mickens J, McCune JM
Chapter Roots of Trust 2011 • SpringerBriefs in Computer Science • 10:35-40 Parno B, McCune JM, Perrig A
Conference The web interface should be radically refactored 2011 • Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-10 Douceur JR, Howell J, Parno B, Walfish M, Xiong X
Chapter Validating the Process 2011 • SpringerBriefs in Computer Science • 10:51-52 Parno B, McCune JM, Perrig A
Chapter What Do We Need to Know? Techniques for Recording Platform State 2011 • SpringerBriefs in Computer Science • 10:3-11 Parno B, McCune JM, Perrig A
Conference Bootstrapping trust in commodity computers 2010 • IEEE Symposium on Security and Privacy: Proceedings • 414-429 Parno B, McCune JM, Perrig A
Conference Non-interactive verifiable computing: Outsourcing computation to untrusted workers 2010 • Lecture Notes in Computer Science • 6223 LNCS:465-482 Gennaro R, Gentry C, Parno B
Conference CLAMP: Practical Prevention of Large-Scale Data Leaks 2009 • IEEE Symposium on Security and Privacy: Proceedings • 154-169 Parno B, McCune JM, Wendlandt D, Andersen DG, Perrig A
Conference Bootstrapping Trust in a "Trusted" Platform 2008 • HotSec 2008 - 3rd USENIX Workshop on Hot Topics in Security Parno B
Conference Countermeasures against government-scale monetary forgery 2008 • Lecture Notes in Computer Science • 5143:262-266 Acquisti A, Christin N, Parno B, Perrig A
Journal Article Flicker: An execution infrastructure for TCB minimization 2008 • Operating Systems Review • 42(4):315-328 McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H
Conference Flicker: An execution infrastructure for tcb minimization 2008 • EuroSys'08 - Proceedings of the EuroSys 2008 Conference • 315-328 McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H
Journal Article How low can you go? 2008 • ACM Sigplan Notices • 43(3):14-25 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A
Journal Article How low can you go? 2008 • Operating Systems Review • 42(2):14-25 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A
Journal Article How low can you go? 2008 • Computer architecture news • 36(1):14-25 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A
Conference How low can you go?: Recommendations for hardware-supported minimal TCB code execution 2008 • Operating Systems Review • 42(2):14-25 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A
Conference SNAPP: Stateless network-authenticated path pinning 2008 • Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08 • 168-178 Parno B, Perrig A, Andersen D
Conference Unidirectional key distribution across time and space with applications to RFID security 2008 • Proceedings of the 17th USENIX Security Symposium • 75-90 Juels A, Pappu R, Parno B