Systematic Security Assessment at an Early Processor Design Stage
暂无分享,去创建一个
[1] Robert Lindell,et al. An Analysis of the Intel 80x86 Security Architecture and Implementations , 1996, IEEE Trans. Software Eng..
[2] Stuart E. Schechter,et al. Quantitatively Differentiating System Security , 2002 .
[3] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[4] Wayne A. Jansen,et al. Directions in Security Metrics Research , 2009 .
[5] Bruce Schneier,et al. Side channel cryptanalysis of product ciphers , 2000 .
[6] Geoffrey Strongin. Trusted computing using AMD "Pacifica" and "Presidio" secure virtual machine technology , 2005, Inf. Secur. Tech. Rep..
[7] Stuart E. Schechter. Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.
[8] D. B. Davis,et al. Intel Corp. , 1993 .
[9] Mahadev Satyanarayanan,et al. Quantifying the Strength of Security Systems , 2007, HotSec.
[10] Stuart E. Schechter. How to Buy Better Testing , 2002, InfraSec.
[11] Jim Goldman,et al. Metrics based security assessment (MBSA): combining the ISO 17799 standard with the systems security engineering capability maturity model (SSE-CMM) , 2004 .
[12] Jeannette M. Wing,et al. A Formal Model for a System's Attack Surface , 2011, Moving Target Defense.