Research directions for automated software verification: using trusted hardware
暂无分享,去创建一个
[1] Stuart G. Stubblebine,et al. Recent-secure authentication: enforcing revocation in distributed systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[4] Virgil D. Gligor,et al. On the Identification of Covert Storage Channels in Secure Systems , 1990, IEEE Trans. Software Eng..
[5] Carl A. Gunter,et al. Infrastructure for Proof-Referencing Code , 1997 .
[6] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[7] John Rushby,et al. Critical system properties: survey and taxonomy , 1994 .
[8] Gary McGraw,et al. Java security: hostile applets, holes&antidotes , 1997 .
[9] Premkumar T. Devanbu,et al. Cryptographic verification of test coverage claims , 1997, ESEC '97/FSE-5.
[10] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.