M-MAP: Multi-factor memory authentication for secure embedded processors
暂无分享,去创建一个
Marten van Dijk | Omer Khan | Masab Ahmad | Syed Kamran Haider | Matthew Seita | Farrukh Hijaz | Ethan Johnson | Astha Patni | Masab Ahmad | O. Khan | Farrukh Hijaz | Matthew Seita | Ethan Johnson | Astha Patni
[1] Gu-Yeon Wei,et al. Aladdin: A pre-RTL, power-performance accelerator simulator enabling large design space exploration of customized architectures , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[2] Marten van Dijk,et al. Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads , 2015, HASP@ISCA.
[3] Alexander Aiken,et al. How is aliasing used in systems software? , 2006, SIGSOFT '06/FSE-14.
[4] Dave Dopson. SoftECC : A System for Software Memory Integrity Checking , 2005 .
[5] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[6] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[7] Babak Falsafi,et al. Flexible Hardware Acceleration for Instruction-Grain Program Monitoring , 2008, 2008 International Symposium on Computer Architecture.
[8] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[9] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[10] Jakub Szefer,et al. Towards fast hardware memory integrity checking with skewed Merkle trees , 2014, HASP@ISCA.
[11] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[12] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[13] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[14] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[15] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[16] George Kurian,et al. Graphite: A distributed parallel simulator for multicores , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[17] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[18] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[19] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[20] Jonathan M. Smith,et al. Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security , 2013, CCS.
[21] G. Edward Suh,et al. Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking , 2003, ASIACRYPT.
[22] Saraju P. Mohanty,et al. TSV: A novel energy efficient Memory Integrity Verification scheme for embedded systems , 2013, J. Syst. Archit..
[23] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[24] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[25] Milo M. K. Martin,et al. Hardbound: architectural support for spatial safety of the C programming language , 2008, ASPLOS.
[26] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[27] Rajeev Barua,et al. MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime , 2010, 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation.
[28] Milo M. K. Martin,et al. Watchdog: Hardware for safe and secure manual memory management and full memory safety , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[29] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[30] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[31] G. Edward Suh,et al. Efficient Memory Integrity Verification and Encryption for Secure Processors , 2003, MICRO.
[32] Benjamin C. Pierce,et al. A verified information-flow architecture , 2014, J. Comput. Secur..
[33] Gu-Yeon Wei,et al. MachSuite: Benchmarks for accelerator design and customized architectures , 2014, 2014 IEEE International Symposium on Workload Characterization (IISWC).
[34] Milo M. K. Martin,et al. WatchdogLite: Hardware-Accelerated Compiler-Based Pointer Checking , 2014, CGO '14.
[35] John L. Henning. SPEC CPU2006 benchmark descriptions , 2006, CARN.
[36] John Magee,et al. Virtual Fingerprint - Image-Based Authentication Increases Privacy for Users of Mouse-Replacement Interfaces , 2015, HCI.