TrustGeM: Dynamic trusted environment generation for chip-multiprocessors
暂无分享,去创建一个
[1] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[2] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[3] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[4] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[5] Srivaths Ravi,et al. SECA: security-enhanced communication architecture , 2005, CASES '05.
[6] Meikang Qiu,et al. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software , 2006, IEEE Transactions on Computers.
[7] Carla E. Brodley,et al. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address , 2006, IEEE Transactions on Computers.
[8] H. Peter Hofstee,et al. Cell Broadband Engine processor vault security architecture , 2007, IBM J. Res. Dev..
[9] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[10] Nikil D. Dutt,et al. PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors , 2010, WESS '10.
[11] Nikil D. Dutt,et al. E-RoC: Embedded RAIDs-on-Chip for low power distributed dynamically managed reliable memories , 2011, 2011 Design, Automation & Test in Europe.
[12] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[13] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[14] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[15] Sri Parameswaran,et al. SHIELD: A software hardware design methodology for security and reliability of MPSoCs , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[16] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.