Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
暂无分享,去创建一个
Deian Stefan | Alejandro Russo | Pablo Buiras | Amit A. Levy | David Mazières | David Terei | Edward Z. Yang | David Mazières | David Terei | A. Levy | D. Stefan | Alejandro Russo | Pablo Buiras
[1] Gilles Barthe,et al. Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[2] Jean-Pierre Seifert,et al. Deconstructing new cache designs for thwarting software cache-based side channel attacks , 2008, CSAW '08.
[3] Heiko Mantel,et al. Combining Different Proof Techniques for Verifying Information Flow Security , 2006, LOPSTR.
[4] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[5] Danfeng Zhang,et al. Language-based control and mitigation of timing channels , 2012, PLDI.
[6] Dan Page,et al. Partitioned Cache Architecture as a Side-Channel Defence Mechanism , 2005, IACR Cryptology ePrint Archive.
[7] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[8] Andrei Sabelfeld. The Impact of Synchronisation on Secure Information Flow in Concurrent Programs , 2001, Ershov Memorial Conference.
[9] David Sands,et al. Probabilistic noninterference for multi-threaded programs , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[10] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[11] Marieke Huisman,et al. A temporal logic characterisation of observational determinism , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[12] Naoki Kobayashi. Type-based information flow analysis for the π-calculus , 2005, Acta Informatica.
[13] Jonathan K. Millen. 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[14] Onur Aciiçmez,et al. Yet another MicroArchitectural Attack:: exploiting I-Cache , 2007, CSAW '07.
[15] Deian Stefan,et al. Flexible dynamic information flow control in Haskell , 2012, Haskell '11.
[16] Alejandro Russo,et al. A Library for Secure Multi-threaded Information Flow in Haskell , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[17] Andrew C. Myers,et al. Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[18] Koen Claessen,et al. A library for light-weight information-flow security in haskell , 2008, Haskell '08.
[19] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[20] Ilaria Castellani,et al. Noninterference for concurrent programs and thread systems , 2002, Theor. Comput. Sci..
[21] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[22] Johan Agat,et al. Transforming out timing leaks , 2000, POPL '00.
[23] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[25] Nobuko Yoshida,et al. A uniform type structure for secure information flow , 2002, POPL '02.
[26] Laurent Mauborgne,et al. Automatic Quantification of Cache Side-Channels , 2012, CAV.
[27] Marieke Huisman,et al. Scheduler-Specific Confidentiality for Multi-threaded Programs and Its Logic-Based Verification , 2011, FoVeOOS.
[28] Tachio Terauchi,et al. A Type System for Observational Determinism , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[29] Gurvan Le Guernic. Automaton-based Confidentiality Monitoring of Concurrent Programs , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[30] Michael Walfish,et al. World Wide Web Without Walls , 2007, HotNets.
[31] Ben Hardekopf,et al. Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach , 2011, 2011 IEEE Symposium on Security and Privacy.
[32] Dominique Devriese,et al. FlowFox: a web browser with flexible and precise information flow control , 2012, CCS '12.
[33] Timothy Bourke,et al. seL4: From General Purpose to a Proof of Information Flow Enforcement , 2013, 2013 IEEE Symposium on Security and Privacy.
[34] Danfeng Zhang,et al. Predictive mitigation of timing channels in interactive systems , 2011, CCS '11.
[35] James Riely,et al. Information flow vs. resource access in the asynchronous pi-calculus , 2000, TOPL.
[36] David Sands,et al. Timing Aware Information Flow Security for a JavaCard-like Bytecode , 2005, Electron. Notes Theor. Comput. Sci..
[37] Alejandro Russo,et al. Securing interaction between threads and the scheduler , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[38] Geoffrey Smith,et al. Probabilistic noninterference in a concurrent language , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[39] Heiko Mantel,et al. Static Confidentiality Enforcement for Distributed Programs , 2002 .
[40] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[41] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[42] Zhao Zhang,et al. Gaining insights into multicore cache partitioning: Bridging the gap between simulation and real systems , 2008, 2008 IEEE 14th International Symposium on High Performance Computer Architecture.
[43] KohlerEddie,et al. Making information flow explicit in HiStar , 2011 .
[44] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[45] Heiko Mantel,et al. Eliminating Implicit Information Leaks by Transformational Typing and Unification , 2005, Formal Aspects in Security and Trust.
[46] Brian Campbell,et al. Amortised Memory Analysis Using the Depth of Data Structures , 2009, ESOP.
[47] Alejandro Russo,et al. Closing Internal Timing Channels by Transformation , 2006, ASIAN.
[48] François Pottier. A simple view of type-secure information flow in the /spl pi/-calculus , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[49] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[50] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[51] Geoffrey Smith,et al. A new type system for secure information flow , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[52] No License,et al. Intel ® 64 and IA-32 Architectures Software Developer ’ s Manual Volume 3 A : System Programming Guide , Part 1 , 2006 .
[53] Alejandro Russo,et al. Security for Multithreaded Programs Under Cooperative Scheduling , 2006, Ershov Memorial Conference.
[54] Gilles Barthe,et al. Preventing Timing Leaks Through Transactional Branching Instructions , 2006, QAPL.
[55] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[56] S. Eranian. Perfmon2: a flexible performance monitoring interface for Linux , 2010 .
[57] Joseph Bonneau,et al. Cache-Collision Timing Attacks Against AES , 2006, CHES.
[58] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[59] Ilaria Castellani,et al. Noninterference for Concurrent Programs , 2001, ICALP.
[60] Deian Stefan,et al. Addressing covert termination and timing channels in concurrent information flow systems , 2012, ICFP '12.
[61] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[62] Taesoo Kim,et al. STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud , 2012, USENIX Security Symposium.
[63] Nobuko Yoshida,et al. Secure Information Flow as Typed Process Behaviour , 2000, ESOP.
[64] Danfeng Zhang,et al. Predictive black-box mitigation of timing channels , 2010, CCS '10.
[65] Alejandro Russo,et al. Secure Multi-execution in Haskell , 2011, Ershov Memorial Conference.
[66] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[67] Claudia Eckert,et al. Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture , 2012 .
[68] N. Nethercote,et al. The cache behaviour of large lazy functional programs on stock hardware , 2002, MSP '02.
[69] Sally A. McKee,et al. Can hardware performance counters be trusted? , 2008, 2008 IEEE International Symposium on Workload Characterization.
[70] Mark A. Hillebrand,et al. Invariants, Modularity, and Rights , 2009, Ershov Memorial Conference.
[71] Peng Li,et al. Arrows for secure information flow , 2010, Theor. Comput. Sci..
[72] Winnie Cheng,et al. Abstractions for Usable Information Flow Control in Aeolus , 2012, USENIX Annual Technical Conference.
[73] Geoffrey Smith,et al. Probabilistic noninterference through weak probabilistic bisimulation , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[74] Will Partain,et al. The nofib Benchmark Suite of Haskell Programs , 1992, Functional Programming.
[75] Gilles Barthe,et al. Security of multithreaded programs by compilation , 2007, TSEC.
[76] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[77] Christoforos E. Kozyrakis,et al. Vantage: Scalable and efficient fine-grain cache partitioning , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).