Information flow isolation in I2C and USB
暂无分享,去创建一个
Wei Hu | Ryan Kastner | Timothy Sherwood | Mohit Tiwari | Jason Oberg | Ali Irturk | T. Sherwood | Wei Hu | R. Kastner | Mohit Tiwari | J. Oberg | A. Irturk
[1] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[2] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[3] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[4] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[5] Wei-Ming Hu. Reducing Timing Channels with Fuzzy Time , 1992, J. Comput. Secur..
[6] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[7] Frederic T. Chong,et al. Complete information flow tracking from the gates up , 2009, ASPLOS.
[8] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[9] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[10] Wei Hu,et al. Theoretical analysis of gate level information flow tracking , 2010, Design Automation Conference.