Trusted Hardware: Can It Be Trustworthy?
暂无分享,去创建一个
[1] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[2] Robert Lindell,et al. The Intel 80/spl times/86 processor architecture: pitfalls for secure systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[3] Cynthia E. Irvine,et al. Subversion as a Threat in Information Warfare , 2004 .
[4] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[5] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[6] William H. Mangione-Smith,et al. Deep packet filter with dedicated logic and read only memories , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[7] Gang Wang,et al. Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[8] D. Buell. High-Performance Reconfigurable Computing , 2007 .
[9] P. A. Karger,et al. Multics security evaluation: vulnerability analysis , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[10] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[11] K. Thompson. Reflections on trusting trust , 1984, CACM.
[12] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .
[13] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[14] S ECURITY A RCHITECTURE FOR E MBEDDED S YSTEMS. Reconfigurable Security Architecture for Embedded Systems , 2005 .
[15] Tarek A. El-Ghazawi,et al. Guest Editors' Introduction: High-Performance Reconfigurable Computing , 2007, Computer.
[16] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[17] Timothy Sherwood,et al. Bit-split string-matching engines for intrusion detection and prevention , 2006, TACO.
[18] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[19] Alok N. Choudhary,et al. A reconfigurable architecture for network intrusion detection using principal component analysis , 2006, FPGA '06.
[20] Ryan Kastner,et al. Policy-Driven Memory Protection for Reconfigurable Hardware , 2006, ESORICS.
[21] Alok N. Choudhary,et al. High-Performance Software Protection Using Reconfigurable Architectures , 2006, Proceedings of the IEEE.
[22] Terry V. Benzel,et al. Design Principles for Security , 2005 .