Idea: State-Continuous Transfer of State in Protected-Module Architectures
暂无分享,去创建一个
[1] Andrew Martin,et al. BottleCap: a credential manager for capability systems , 2012, STC '12.
[2] Frank Piessens,et al. Efficient Isolation of Trusted Subsystems in Embedded Systems , 2010, SecureComm.
[3] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Frank Piessens,et al. Breaking the memory secrecy assumption , 2009, EUROSEC '09.
[5] Jonathan M. McCune,et al. Memoir: Practical State Continuity for Protected Modules , 2011, 2011 IEEE Symposium on Security and Privacy.
[6] Marco Patrignani,et al. Secure Compilation of Object-Oriented Components to Protected Module Architectures , 2013, APLAS.
[7] Ramakrishna Kotla,et al. Pasture: Secure Offline Data Access Using Commodity Trusted Hardware , 2012, OSDI.
[8] Brian Campbell,et al. Amortised Memory Analysis Using the Depth of Data Structures , 2009, ESOP.
[9] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[10] Frank Piessens,et al. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base , 2013, USENIX Security Symposium.
[11] Frank Piessens,et al. Sound Modular Verification of C Code Executing in an Unverified Context , 2014, POPL.
[12] Frank Piessens,et al. ICE: a passive, high-speed, state-continuity scheme , 2014, ACSAC.
[13] Frank Piessens,et al. Fides: selectively hardening software application components against kernel-level or process-level malware , 2012, CCS '12.
[14] Jonathan M. McCune,et al. OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms , 2013, CCS.
[15] Vijay Varadharajan,et al. TrustLite: a security architecture for tiny embedded devices , 2014, EuroSys '14.
[16] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[17] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[18] James Newsome,et al. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework , 2013, 2013 IEEE Symposium on Security and Privacy.
[19] Marco Patrignani,et al. Secure Compilation to Protected Module Architectures , 2015, TOPL.
[20] Roy H. Campbell,et al. BootJacker: compromising computers using forced restarts , 2008, CCS.
[21] Srinivas Devadas,et al. Offline untrusted storage with immediate detection of forking and replay attacks , 2007, STC '07.
[22] Frank Piessens,et al. Secure Compilation to Modern Processors , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[23] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .