Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach
暂无分享,去创建一个
[1] Russ Housley,et al. An Internet Attribute Certificate Profile for Authorization , 2010, RFC.
[2] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[3] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[4] Ravishankar K. Iyer,et al. Toward Application-Aware Security and Reliability , 2007, IEEE Security & Privacy.
[5] M. Joye,et al. Recovering lost efficiency of exponentiation algorithms on smart cards , 2002 .
[6] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[7] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[8] Paul Dabrowski,et al. Ensuring Critical Data Integrity via Information Flow Signatures , 2007 .
[9] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[10] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[11] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[12] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[13] Ravishankar K. Iyer,et al. Hardware support for high performance, intrusion- and fault-tolerant systems , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[14] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[15] R. Power. CSI/FBI computer crime and security survey , 2001 .
[16] Mike Bond,et al. Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.
[17] Mark Weiser,et al. Program Slicing , 1981, IEEE Transactions on Software Engineering.
[18] Sean W. Smith. Outbound Authentication for Programmable Secure Coprocessors , 2002, ESORICS.
[19] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[20] Christof Paar,et al. Cryptography on FPGAs: State of the Art Implementations and Attacks , 2003 .