A Run-Time Reconfigurable Architecture for Embedded Program Flow Verification
暂无分享,去创建一个
[1] Hsien-Hsin S. Lee,et al. High efficiency counter mode security architecture via prediction and precomputation , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[2] Amir Roth,et al. Using DISE to protect return addresses from attack , 2005, CARN.
[3] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[4] Jun Yang,et al. Fast secure processor for inhibiting software piracy and tampering , 2003, Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36..
[5] Miodrag Potkonjak,et al. Enabling trusted software integrity , 2002, ASPLOS X.
[6] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[7] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[8] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[9] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[10] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .