InfoShield: a security architecture for protecting information usage in memory
暂无分享,去创建一个
Hsien-Hsin S. Lee | Jun Yang | Weidong Shi | Joshua B. Fryman | Guofei Gu | Youtao Zhang | Jun Yang | Youtao Zhang | H. Lee | G. Gu | J. Fryman | Wei-qi Shi
[1] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[2] Yuanyuan Zhou,et al. SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs , 2005, 11th International Symposium on High-Performance Computer Architecture.
[3] Barbara Liskov,et al. A language extension for expressing constraints on data access , 1978, CACM.
[4] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[5] Norman Hardy,et al. KeyKOS architecture , 1985, OPSR.
[6] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[7] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[8] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[9] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[10] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[11] Martín Abadi,et al. A core calculus of dependency , 1999, POPL '99.
[12] Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow , 2001, ESOP.
[13] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[14] William A. Wulf,et al. Policy/mechanism separation in Hydra , 1975, SOSP.
[15] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[16] George C. Necula,et al. Efficient representation and validation of proofs , 1998, Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226).
[17] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[18] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[19] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[20] Abhishek Kumar. Discovering passwords in the memory , 2003 .
[21] Geoffrey Smith,et al. Verifying secrets and relative secrecy , 2000, POPL '00.
[22] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[23] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[24] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.