Building Technologies that Help Cyber-Defense: Hardware-enabled Trust
暂无分享,去创建一个
[1] Marcin Wójcik,et al. Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM , 2011, INTRUST.
[2] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[3] G. Edward Suh,et al. Orthrus: efficient software integrity protection on multi-cores , 2010, ASPLOS 2010.
[4] Valeria Bertacco,et al. Engineering Trust with Semantic Guardians , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[5] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.
[6] Richard McClatchey,et al. A Scalable Evidence Based Self-Managing Framework for Trust Management , 2007, Electron. Notes Theor. Comput. Sci..
[7] Gaurav Shah,et al. Keyboards and Covert Channels , 2006, USENIX Security Symposium.
[8] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[9] Tilman Wolf,et al. Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[10] Wei Hu,et al. Theoretical analysis of gate level information flow tracking , 2010, Design Automation Conference.
[11] Jiangtao Li,et al. Consumerization: Consequences of Fuzzy Work-Home Boundaries , 2012 .
[12] Jiangtao Li,et al. A Practical Device Authentication Scheme Using SRAM PUFs , 2011, TRUST.
[13] Robert H. Deng,et al. Remote attestation on program execution , 2008, STC '08.
[14] Ruby B. Lee,et al. A novel cache architecture with enhanced performance and security , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[15] Jean-Pierre Seifert,et al. Software mitigations to hedge AES against cache-based software side channel vulnerabilities , 2006, IACR Cryptol. ePrint Arch..
[16] Joseph Bonneau,et al. Cache-Collision Timing Attacks Against AES , 2006, CHES.
[17] Timothy Casey,et al. Threat agents: a necessary component of threat analysis , 2010, CSIIRW '10.
[18] Tomas Olovsson,et al. Passive internet measurement: Overview and guidelines based on experiences , 2010, Comput. Commun..
[19] Frederick T. Sheldon,et al. Moving Toward Trustworthy Systems: R&D Essentials , 2010, Computer.
[20] Zhendong Su,et al. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[21] Frederic T. Chong,et al. Gate-Level Information-Flow Tracking for Secure Architectures , 2010, IEEE Micro.
[22] Stephen Barrett,et al. Presumptive selection of trust evidence , 2007, AAMAS '07.
[23] Ruby B. Lee,et al. Architecture for Protecting Critical Secrets in Microprocessors , 2005, ISCA 2005.