Leveraging Gate-Level Properties to Identify Hardware Timing Channels
暂无分享,去创建一个
[1] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[2] Ryan Kastner,et al. A practical testing framework for isolating hardware timing channels , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[3] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[4] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[5] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[6] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[7] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[8] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[9] Frederic T. Chong,et al. Caisson: a hardware description language for secure information flow , 2011, PLDI '11.
[10] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[11] Frederic T. Chong,et al. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).
[12] Frederic T. Chong,et al. Complete information flow tracking from the gates up , 2009, ASPLOS.
[13] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES (Short Paper) , 2006, ICICS.
[14] Ying Gao,et al. SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip , 2013, ISCA.
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] John L. Henning. SPEC CPU2006 benchmark descriptions , 2006, CARN.
[17] Wei-Ming Hu. Reducing Timing Channels with Fuzzy Time , 1992, J. Comput. Secur..
[18] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[19] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[20] Richard A. Kemmerer,et al. Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.
[21] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[22] Frederic T. Chong,et al. Execution leases: A hardware-supported mechanism for enforcing strong non-interference , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[23] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[24] Wei Hu,et al. Information flow isolation in I2C and USB , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[25] John C. Wray. An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..
[26] James W. Gray. On introducing noise into the bus-contention channel , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[27] Edward A. Lee,et al. A framework for comparing models of computation , 1998, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[28] David W. Palmer,et al. An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designs , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[29] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[30] Ryan Kastner,et al. Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip , 2013, IEEE Design & Test.
[31] David Lee,et al. Principles and methods of testing finite state machines-a survey , 1996, Proc. IEEE.