Formally Verified, Tag-Based Security Monitors
暂无分享,去创建一个
Benjamin C. Pierce | Antal Spector-Zabusky | Arthur Azevedo de Amorim | Andrew Tolmach | Nick Giannarakis | B. Pierce | A. Tolmach | Antal Spector-Zabusky | Nick Giannarakis
[1] Jonathan M. Smith,et al. Architectural Support for Software-Defined Metadata Processing , 2015, ASPLOS.
[2] Ahmad-Reza Sadeghi,et al. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection , 2014, USENIX Security Symposium.
[3] Andrew W. Appel,et al. Portable Software Fault Isolation , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[4] Ben Niu,et al. Modular control-flow integrity , 2014, PLDI.
[5] Ahmad-Reza Sadeghi,et al. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[6] Vikram S. Adve,et al. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels , 2014, 2014 IEEE Symposium on Security and Privacy.
[7] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Jonathan M. Smith,et al. Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security , 2013, CCS.
[9] Adam Chlipala,et al. The bedrock structured programming system: combining generative metaprogramming and hoare logic in an extensible program verifier , 2013, ICFP.
[10] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Benjamin C. Pierce,et al. All Your IFCException Are Belong to Us , 2013, 2013 IEEE Symposium on Security and Privacy.
[12] Milo M. K. Martin,et al. Hardware-Enforced Comprehensive Memory Safety , 2013, IEEE Micro.
[13] Nick Benton,et al. High-level separation logic for low-level code , 2013, POPL.
[14] Jonathan M. Smith,et al. Hardware Support for Safety Interlocks and Introspection , 2012, 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[15] Bjorn De Sutter,et al. ARMor: Fully verified software fault isolation , 2011, 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT).
[16] Martín Abadi,et al. On Protection by Layout Randomization , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[17] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[18] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[19] Bennet S. Yee,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[20] Xavier Leroy,et al. Formal Verification of a C-like Memory Model and Its Uses for Verifying Program Transformations , 2008, Journal of Automated Reasoning.
[21] Alessandro Orso,et al. Effective memory protection using dynamic tainting , 2007, ASE '07.
[22] Martín Abadi,et al. Architectural support for software-based protection , 2006, ASID '06.
[23] Kevin W. Hamlen,et al. Computability classes for enforcement mechanisms , 2006, TOPL.
[24] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[25] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[26] Benjamin C. Pierce,et al. A bisimulation for dynamic sealing , 2004, Theor. Comput. Sci..
[27] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[28] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[29] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[30] James H. Morris. Protection in programming languages , 1973, CACM.
[31] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .