A Hardware Design Language for Timing-Sensitive Information-Flow Security
暂无分享,去创建一个
Yao Wang | G. Edward Suh | Danfeng Zhang | Andrew C. Myers | A. Myers | G. Suh | Danfeng Zhang | Yao Wang | G. Edward Suh | Andrew C. Myers
[1] Koen De Bosschere,et al. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[2] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[3] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[4] Lennart Augustsson,et al. Cayenne—a language with dependent types , 1998, ICFP '98.
[5] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[6] Steve Zdancewic,et al. Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[7] David Sands,et al. On flow-sensitive security types , 2006, POPL '06.
[8] John G. P. Barnes,et al. High Integrity Software - The SPARK Approach to Safety and Security , 2003 .
[9] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[10] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[11] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[12] Frederic T. Chong,et al. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).
[13] Onur Aciiçmez,et al. Yet another MicroArchitectural Attack:: exploiting I-Cache , 2007, CSAW '07.
[14] Juan Chen,et al. Secure distributed programming with value-dependent types , 2011, Journal of Functional Programming.
[15] Vincent Simonet. The Flow Caml System: Documentation and user's manual , 2003 .
[16] Danfeng Zhang,et al. Language-based control and mitigation of timing channels , 2012, PLDI.
[17] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[18] Frederic T. Chong,et al. Sapper: a language for hardware-level security policy enforcement , 2014, ASPLOS.
[19] Dan Page,et al. Partitioned Cache Architecture as a Side-Channel Defence Mechanism , 2005, IACR Cryptology ePrint Archive.
[20] Frederic T. Chong,et al. Execution leases: A hardware-supported mechanism for enforcing strong non-interference , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[21] Wei Hu,et al. Information flow isolation in I2C and USB , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[22] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[23] A. W. Roscoe. CSP and determinism in security modelling , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[24] Frederic T. Chong,et al. Caisson: a hardware description language for secure information flow , 2011, PLDI '11.
[25] Hongwei Xi,et al. Imperative programming with dependent types , 2000, Proceedings Fifteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.99CB36332).
[26] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[27] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[28] Edsger W. Dijkstra,et al. Guarded commands, nondeterminacy and formal derivation of programs , 1975, Commun. ACM.
[29] Andrew C. Myers,et al. Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[30] Robert W. Floyd,et al. Assigning Meanings to Programs , 1993 .
[31] Luís Caires,et al. Dependent Information Flow Types , 2015, POPL.
[32] Juan Chen,et al. Enforcing Stateful Authorization and Information Flow Policies in Fine , 2010, ESOP.
[33] Frank Pfenning,et al. Dependent types in practical programming , 1999, POPL '99.
[34] Michael Hicks,et al. Fable: A Language for Enforcing User-defined Security Policies , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[35] Andrew C. Myers,et al. Dynamic security labels and static information flow control , 2007, International Journal of Information Security.
[36] Wei Hu,et al. Theoretical analysis of gate level information flow tracking , 2010, Design Automation Conference.
[37] Frederic T. Chong,et al. Complete information flow tracking from the gates up , 2009, ASPLOS.
[38] George C. Necula,et al. Dependent Types for Low-Level Programming , 2007, ESOP.
[39] Lauretta O. Osho,et al. Axiomatic Basis for Computer Programming , 2013 .
[40] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[41] Lennart Beringer,et al. Noninterference with Dynamic Security Domains and Policies , 2009, ASIAN.
[42] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[43] Michael J. C. Gordon,et al. The semantic challenge of Verilog HDL , 1995, Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science.
[44] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[45] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[46] G. Edward Suh,et al. A Hardware Design Language for Efficient Control of Timing Channels , 2014 .
[47] Steve Zdancewic,et al. AURA: a programming language for authorization and audit , 2008, ICFP 2008.
[48] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[49] Deepak Garg,et al. Verification of Information Flow and Access Control Policies with Dependent Types , 2011, 2011 IEEE Symposium on Security and Privacy.