An Analysis of the Intel 80x86 Security Architecture and Implementations
暂无分享,去创建一个
[1] Hilarie Orman,et al. Reverification of a microprocessor , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[2] P. J. Windley,et al. A hierarchical methodology for verifying microprogrammed microprocessors , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Jeffrey J. Joyce,et al. Formal Verification and Implementation of a Microprocessor , 1988 .
[4] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Leo Marcus,et al. Using the State Delta Verification System (SDVS) for Hardware Verification , 1992, TPCD.
[6] Joshua D. Guttman,et al. Verifying a hardware security architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] W.J. Cullyer. Implementing high integrity systems: the VIPER microprocessor , 1989, IEEE Aerospace and Electronic Systems Magazine.
[8] Robert Lindell,et al. The Intel 80/spl times/86 processor architecture: pitfalls for secure systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[9] James L. Turley. Advanced 80386 Programming Techniques , 1988 .
[10] R K Bauer,et al. Security Concepts for Microprocessor Based Key Generator Controllers. , 1984 .
[11] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[12] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[13] Jeff Jones,et al. The Architecture of Triad: A Distributed, Real-Time, Trusted System , 1995 .
[14] M. K. Srivas,et al. Applying formal verification to a commercial microprocessor , 1995, Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair.
[15] John C. Wray. An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..
[16] Carl E. Landwehr,et al. A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .
[17] Virgil D. Gligor. Analysis of the Hardware Verification of the Honeywell SCOMP , 1985, 1985 IEEE Symposium on Security and Privacy.