Publications

This is my original publication list that has not been updated since 2007 or so. I left it here for historical reasons because some of the entries have the links to the actual paper. As so many things today, you are better off searching the web and Google Scholar is a good place to start for finding most of my publications. If you would like to see a list of my patents, Google Patents is a good place to start.

Book(s)

  • Challener, D., Hoff, J., Catherman, R., Safford, D., Van Doorn, L., Practical Guide to Trusted Computing, IBM Press series, Prentice Hall, December 2007. ISBN 01-32398-42-7.

  • Van Doorn, L., The Design and Application of an Extensible Operating System, Labyrint Publications, Capelle a/d Ijsel - Holland, March 2001. ISBN 90-72591-88-7 (don't let the 10 page Dutch abstract fool you, the thesis is written in English).

    Book Chapter(s)

  • Franklin, J., Luk, M., McCune, J.M., Seshadri, A., Perrig, A., and van Doorn, L., Towards Sound Detection of Virtual Machines, contribution to Botnet Detection: Countering the Largest Security Threat, edited by by Wenke Lee, Cliff Wang, and David Dagon, Springer-Verlag, 2008. ISBN 978-0-387-68766-7.

  • Van Doorn, L., Abadi, M., Burrows, M., and Wobber, E., Secure Network Objects, J. Vitek and P. Jensen (eds.), Secure Internet Programming - Security issues for Mobile and Distributed Objects, Springer-Verlag, 1999. ISBN 35-40661-30-1. (extended version of our conference paper)

    Journal(s)

  • Seshadri, A., Luk, M., Perrig, A., Van Doorn, L., Khosla, P., Externally Verifiable Code Execution, Communcations of the ACM, September 2006.

  • Sailer, R., Van Doorn, L., Ward, J., The Role of TPM in Enterprise Security, Datenschutz und Datensicherheit, September 2004.

  • Arnold, T.W. and Van Doorn, L. P., The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer, IBM Journal of Research and Development, Vol 48, No 3/4, 2004, pp. 491-503.

  • Branch, J.W., Petroni, N.L, Van Doorn, L., Safford, D., Autonomic 802.11 Wireless LAN Security Auditing, IEEE Security & Privacy, May/June 2004, pp. 56-65.

  • Dyer, J.G., Lindemann, M., Perez, R., Sailer, R., Smith, S.W., Van Doorn, L., Weingart, S., The IBM Secure Coprocessor: Overview and Retrospective, IEEE Computer, October 2001.

  • Caminada, M.W.A., Van der Riet, R.P., Van Zanten, Van Doorn, L., Internet Security Incidents, a Survey within Dutch Organisations, Computers & Security, Elsevier, Vol. 17, No. 5, 1998, 417-433

    Conference(s)

  • Vasudevan, A., McCune, J.M., Newsome, J., Perrig, A. and van Doorn, L.. CARMA: A Hardware Tamper-Resistant Isolated Execution Environment on Commodity x86 Platforms, ACM Symposium on Information, Computer and Communications Security (ASIACCS), May 2012.

  • Vasudevan, A., McCune, J.M., Qu, N., van Doorn, L., and Perrig, A., Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture, Proc. of the 3rd International Conference on Trust and Trustworthy Computing (Trust), June, 2010.

  • Berger, S., Caceres, C., Goldman, K., Perez, R., Sailer, R., Van Doorn, L., vTPM: Virtualizing the Trusted Platform Module, Proc. of the 15th Usenix Security Symposium, USENIX, Vancouver, B.C., Canada, July 2006.

  • Sailer, R., Jaeger, T., Valdez, E., Caceres, C., Perez, R., Berger, S., Griffin, J., Van Doorn, L., Building a MAC-based Security Architecture for the Xen Opensource Hypervisor, Proc. of the 21st Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, December 2005.

  • Seshadri, A., Luk, M., Shi, E., Perrig, A., Van Doorn, L., Khosla, P., Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems, Proc. of the ACM Symposium on Operating Systems Principles, ACM, Brighton, UK, October 2005.

  • Shi, E., Perrig, A., Van Doorn, L., BIND: A Fine-grained Attestation Service for Secure Distributed Systems, Proc. of the IEEE Security & Privacy Conference, IEEE, Oakland, CA, May 2005.

  • Sailer, R., Jaeger, T., Zhang, X., Van Doorn, L., Attestation-based Policy Enforcement for Remote Access, Proc. of the 11th ACM Conference on Computer and Communications Security (CCS), Washington, DC, October 2004,

  • Sailer, R., Zhang, X., Jaeger, T., Van Doorn, L., Design and Implementation of a TCG-Based Integrity Measurement Architecture, Proc. of the 13th Usenix Security Symposium, USENIX, San Diego, CA, August 2004.

  • Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P., SWATT: SoftWare-based ATTestation for Embedded Devices, Proc. of the IEEE Security & Privacy Conference, IEEE, Oakland, CA, May 2004.

  • Sailer, R., Perez, R., Dyer, J.G., Van Doorn, L., Personal Firewalls and Intrusion Detection System, Proc of the 2nd Australian Information Warfare and Security Conference (IWAR), November 2001.

  • Van Doorn, L., A Secure Java Virtual Machine, Proc. of the Ninth Usenix Security Symposium, USENIX, Denver, CO, August 2000, 19-34.

  • Caminada, M.W.A., Van der Riet, R.P., Van Zanten, Van Doorn, L., Internet Security Incidents, a Survey within Dutch Organisations, Proc. of the AACE WebNet 98 World Conference of the WWW, Internet, and Intranet, Orlando, FL, November 1998.

  • Van Doorn, L., and Tanenbaum, A.S., FlexRTS: An extensible Orca Run-time System, Proc. of the Third ASCI Conference, ASCI, Heijen, The Netherlands, May 1997, 111-115.

  • Van Doorn, L., Abadi, M., Burrows, M., and Wobber, E., Secure Network Objects, Proc. of the IEEE Security & Privacy Conference, IEEE, Oakland, CA, May 1996, 211-221.

  • Homburg, P., Van Doorn, L., Van Steen, M., and Tanenbaum, A.S., An Object Model for Flexible Distributed Systems, Proc. of the First ASCI Conference, ASCI, Heijen, The Netherlands, May 1995, 69-78.

    Workshops(s)

  • McCune, J.M., Perrig, A., Seshadri, A., and van Doorn, L., Turtles All The Way Down: Research Challenges in User-Based Attestation, Proc. of the Workshop on Hot Topics in Security (HotSec), August, 2007.

  • M. Ben-Yehuda, J. Xenidis, M. Ostrowski, K. Rister, A. Bruemmer, and L. Van Doorn, The Price of Safety: Evaluating IOMMU Performance, Proc. of the 2007 Ottawa Linux Symposium (OLS), Ottawa, Canada, July, 2007.

  • Garriss, S., Caceres, R., Berger, S., Sailer, R., Van Doorn, L. and Zhang, X., Towards Trustworthy Kiosk Computing, Proc. of 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), Tucson, AZ, February 2007.

  • Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P., SCUBA: Secure Code Update By Attestation in Sensor Networks, Proc. of the ACM Workshop on Wireless Security (WiSe 2006), Los Angeles, CA, September 2006.

  • M. Ben-Yehuda, J. Mason, O. Krieger, E. Wahlig, L. Van Doorn, J. Nakajima, A.K. Malick, Utilizing IOMMUs for Virtualization in Linux and Xen, Proc. of the 2006 Ottawa Linux Symposium (OLS), Ottawa, Canada, July, 2006.

  • J.L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. Van Doorn, R. Caceres, Trusted Virtual Domains: Toward Secure Distributed Services, Proc. of the First Workshop on Hot Topics in System Dependability (Hotdep05), IEEE, Yokohama, Japan, June, 2005.

  • R. Sailer, E. Valdez, R. Perez, T. Jaeger, L. Van Doorn, J.L. Griffin, S. Berger sHype - Hypervisor Security Architecture, 9. Deutscher IT-Sicherheitskongress, Bundesamt fuer Sicherheit in der Informationstechnik, May, 2005.

  • Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P., Using SWATT for Verifying Embedded Systems in Cars, Embedded Security in Cars Workshop (ESCAR 2004).

  • Hendricks, J, and Van Doorn, L., Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base, Proc. of the Eleventh SIGOPS European Workshop, ACM SIGOPS, Leuven, Belgium, September 2004.

  • Zhang, X., Van Doorn, L., Jaeger, T., Perez, R., Sailer, R., Secure Coprocessor-based Intrusion Detection, Proc. of the Tenth ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002.

  • Van Steen, M., Homburg, P., Van Doorn, L., Tanenbaum, A.S., de Jonge, W., Toward Object-based Wide Area Distributed Systems, Proc. of the International Workshop on Object Orientation in Operating Systems, IEEE, Lund, Sweden, August 1995, 224-227.

  • Van Doorn, L., Homburg, P., and Tanenbaum, A.S., Paramecium: An extensible object-based kernel, Proc. of the Fifth Hot Topics in Operating Systems (HotOS) Workshop, IEEE, Orcas Island, WA, May 1995, 86-89.

  • Van Doorn, L., and Tanenbaum, A.S., Using Active Messages to Support Shared Objects, Proc. of the Sixth SIGOPS European Workshop, ACM SIGOPS, Wadern, Germany, September 1994, 112-116.

    Unreferreed

  • Franklin, J., Luk, M., McCune, J.M., Seshadri, A., Perrig, A., and van Doorn, L., Remote Detection of Virtual Machine Monitors with Fuzzy Benchmarking, CMU Cylab Technical Report CMU-CyLab-07-001, January 2007 .

  • Bussani, A., Griffin, J.L., Jansen, B., Julisch, K., Karjoth, G., Maruyama, H., Nakamura, M., Perez, R., Schunter, M., Tanner, A., Van Doorn, L., Van Herreweghen, E.A., Waidner, M., Yoshihama, S., Trusted Virtual Domains: Secure Foundations for Business and IT Service, RC23792, IBM Watson T.J. Watson, New York, NY, November 2005.

  • Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P., Using FIRE & ICE for Detecting and Recovering Compromised Nodes in Sensor Networks, CMU Technical Report, CMU-CS-04-187, December 2004.

  • Safford, D., Kravitz, J., Van Doorn, L., Take Control of TCPA, Linux Journal, August 2003.

  • Arbaugh, W. A., Van Doorn, L. Special Issue on Embedded Systems Security, IEEE Computer, pp. 11 - 13, October 2001.

  • Van Doorn, L., Ballintijn, G., Arbaugh, W.A., Signed Executables for Linux, UMD CS-TR-4259, June 2001.

  • Van Doorn, L. Computer Break-ins: A Case Study, Proc. of the Annual Dutch Unix User Group (NLUUG) Conference, October 1992, 143-151.

    Patents

  • Bade, S.A., Betz, L.N., Kegel, A.G., Safford, D.R., Van Doorn, L.P., Method and system for bootstrapping a trusted server having redundant trusted platform modules, US Patent 7,664,965

  • Challener, D.C., Kump, G.M., Noel F.E., Safford, D.R., Schales D.L., Van Doorn, L.P., Methods apparatus and program product for wireless access points, US Patent 7,380,268

  • Bade, S.A., Kegel, A.G., Van Doorn, L.P., Trust evaluation, US Patent 7,266,475.

  • Challener, D.C., Mastrianni, S.J., Parker, J.R., Ray, R., Van Doorn, L.P., Method for establishing network connections, US Patent 7,181,653.

  • Challener, D.C., Safford, D.R., Van Doorn, L., Computer system apparatus and method for improved assurance of authentication, US Patent 7,085,933.

  • Van Doorn, L. Integrating operating systems and run-time systems, US Patent 6,546,546.

    Keynotes and Panels

    1. Van Doorn, L. Trusted Computing Challenges, Keynote, The Second ACM Workshop on Scalable Trusted Computing (STC'07) November 2007, Alexandria, Virginia.

    2. Van Doorn, L. Virtualization Forum, Intel Developers Forum, September 2006, San Fransisco, CA.

    3. Van Doorn, L. Hardware Virtualization Trends, Keynote, Second International Conference on Virtual Execution Environments (VEE'06), June 2006, Ottawa, Canada.

    4. Van Doorn, L. Panel on Virtualization, Second International Conference on Virtual Execution Environments (VEE'06), June 2006, Ottawa, Canada.

    5. Van Doorn, L. Virtualization Technologies, Panel, The 13th Annual Network and Distributed System Security Symposium (NDSS13), February 2006, San Diego, CA.