High-performance hardware monitors to protect network processors from data plane attacks
暂无分享,去创建一个
[1] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[2] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[3] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[4] Tilman Wolf,et al. Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[5] Salvatore J. Stolfo,et al. Brave New World: Pervasive Insecurity of Embedded Network Devices , 2009, RAID.
[6] MemonNasir,et al. SAFE-OPS: An approach to embedded software security , 2005 .
[7] Lizy Kurian John,et al. NpBench: a benchmark suite for control plane and data plane applications for network processors , 2003, Proceedings 21st International Conference on Computer Design.
[8] David Geer,et al. Malicious bots threaten network security , 2005, Computer.
[9] Srivaths Ravi,et al. Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.
[10] Shufu Mao,et al. Hardware Support for Secure Processing in Embedded Systems , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[11] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[12] Nasir D. Memon,et al. SAFE-OPS: An approach to embedded software security , 2005, TECS.
[13] Scott Shenker,et al. Overcoming the Internet impasse through virtualization , 2005, Computer.
[14] Tilman Wolf,et al. Attacks and Defenses in the Data Plane of Networks , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] Sri Parameswaran,et al. IMPRES: integrated monitoring for processor reliability and security , 2006, 2006 43rd ACM/IEEE Design Automation Conference.
[16] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .