Hardware Support for Safety Interlocks and Introspection
暂无分享,去创建一个
Jonathan M. Smith | Benjamin C. Pierce | J. Gregory Morrisett | Catalin Hritcu | Gregory Malecha | Udit Dhawan | Thomas F. Knight | André DeHon | Albert Kwon | Greg Sullivan | Tom Hawkins | Edin Kadric | David K. Wittenberg | Andrew Sutherland | Sumit Ray | Jonathan M. Smith | Amanda Zyxnfryx | Peter Trei | B. Pierce | Catalin Hritcu | T. Knight | Albert Kwon | J. G. Morrisett | A. DeHon | G. Malecha | S. Ray | David K. Wittenberg | Greg Sullivan | Tom Hawkins | Udit Dhawan | Greg Morrisett | E. Kadrić | Andrew Sutherland | Amanda Zyxnfryx | Peter Trei | Cătălin Hriţcu
[1] Jonathan M. Smith,et al. Preliminary design of the SAFE platform , 2011, PLOS '11.
[2] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[3] Brian N. Bershad,et al. The interaction of architecture and operating system design , 1991, ASPLOS IV.
[4] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[5] Eddie Kohler,et al. Manageable fine-grained information flow , 2008, Eurosys '08.
[6] David Elliott Bell,et al. Looking back at the Bell-La Padula model , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[7] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[8] Milo M. K. Martin,et al. Hardbound: architectural support for spatial safety of the C programming language , 2008, ASPLOS.
[9] Robert P. Colwell,et al. Performance effects of architectural complexity in the Intel 432 , 1988, TOCS.
[10] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[11] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[12] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[13] Richard D. Greenblatt,et al. A LISP machine , 1974, CAW '80.
[14] J. Shapiro,et al. EROS: a fast capability system , 2000, OPSR.
[15] John K. Ousterhout,et al. Why Aren't Operating Systems Getting Faster As Fast as Hardware? , 1990, USENIX Summer.
[16] Frederic T. Chong,et al. Minos: Architectural support for protecting control data , 2006, TACO.
[17] Thomas F. Knight,et al. A capability representation with embedded address and nearly-exact object bounds , 2000 .
[18] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[19] Thomas F. Knight,et al. Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA) , 2009 .
[20] Winnie Cheng,et al. Abstractions for Usable Information Flow Control in Aeolus , 2012, USENIX Annual Technical Conference.
[21] Brian N. Bershad,et al. The interaction of architecture and operating system design , 1991, ASPLOS IV.
[22] Guru Venkataramani,et al. FlexiTaint: A programmable accelerator for dynamic taint propagation , 2008, 2008 IEEE 14th International Symposium on High Performance Computer Architecture.
[23] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[24] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[25] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[26] Cynthia E. Irvine. The Reference Monitor Concept as a Unifying Principle in Computer Security Education , 1999 .
[27] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[28] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.