Complete information flow tracking from the gates up
暂无分享,去创建一个
Frederic T. Chong | Timothy Sherwood | Mohit Tiwari | Hassan M. G. Wassel | Shashidhar Mysore | Bita Mazloom | F. Chong | T. Sherwood | Mohit Tiwari | Shashidhar Mysore | Bita Mazloom
[1] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[2] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[3] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[4] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[5] Xiangyu Zhang,et al. Efficient online detection of dynamic control dependence , 2007, ISSTA '07.
[6] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[7] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[8] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[9] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[10] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[11] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[12] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[13] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[14] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[15] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[16] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[17] Tzi-cker Chiueh,et al. A General Dynamic Information Flow Tracking Framework for Security Applications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[18] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[19] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[20] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[21] Olatunji Ruwase,et al. Parallelizing dynamic information flow tracking , 2008, SPAA '08.
[22] Onur Aciiçmez,et al. Yet another MicroArchitectural Attack:: exploiting I-Cache , 2007, CSAW '07.
[23] Vincent Rijmen,et al. The Advanced Encryption Standard Process , 2002 .
[24] H. Peter Hofstee,et al. Cell Broadband Engine processor vault security architecture , 2007, IBM J. Res. Dev..
[25] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[26] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Des. Test Comput..
[27] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[28] Binyu Zang,et al. From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware , 2008, 2008 International Symposium on Computer Architecture.
[29] Timothy Sherwood,et al. Understanding and visualizing full systems with data flow tomography , 2008, ASPLOS.
[30] Guru Venkataramani,et al. FlexiTaint: A programmable accelerator for dynamic taint propagation , 2008, 2008 IEEE 14th International Symposium on High Performance Computer Architecture.