A high-performance, low-overhead microarchitecture for secure program execution
暂无分享,去创建一个
Ramesh Karri | Sateesh Addepalli | Arun K. Kanuparthi | Gaston Ormazabal | Gaston Ormazabal | R. Karri | A. Kanuparthi | Sateesh Addepalli
[1] Alok N. Choudhary,et al. CODESSEAL: Compiler/FPGA Approach to Secure Applications , 2005, ISI.
[2] Dan Boneh,et al. Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .
[3] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[4] Ruby B. Lee,et al. Enlisting Hardware Architecture to Thwart Malicious Code Injection , 2004, SPC.
[5] Pedro López,et al. Multi2Sim: A Simulation Framework to Evaluate Multicore-Multithreaded Processors , 2007, 19th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD'07).
[6] John Paul Shen,et al. Processor Control Flow Monitoring Using Signatured Instruction Streams , 1987, IEEE Transactions on Computers.
[7] Ramesh Karri,et al. Feasibility study of dynamic Trusted Platform Module , 2010, 2010 IEEE International Conference on Computer Design.
[8] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[9] Ruby B. Lee,et al. Runtime execution monitoring (REM) to detect and prevent malicious code execution , 2004, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings..
[10] Jung Ho Ahn,et al. McPAT: An integrated power, area, and timing modeling framework for multicore and manycore architectures , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[11] Srivaths Ravi,et al. Energy and Execution Time Analysis of a Software-based Trusted Platform Module , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[12] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[13] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[14] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[15] Miodrag Potkonjak,et al. Enabling trusted software integrity , 2002, ASPLOS X.
[16] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.