-
2
-
-
33747367013
-
-
1984.
-
[21 R.K. Bauer, R.J. Feiertag, B.L. Kahn, and W.F. Wilson, "Security Concepts for Microprocessor-Based Key Generator Controllers," Sytek Corporation TR-84009 (contract MDA904-82-C-0449), Apr. 1984.
-
R.J. Feiertag, B.L. Kahn, and W.F. Wilson, "Security Concepts for Microprocessor-Based Key Generator Controllers," Sytek Corporation TR-84009 (Contract MDA904-82-C-0449), Apr.
-
-
Bauer, R.K.1
-
3
-
-
0023826035
-
-
166-176, 1988
-
S.D. Crocker, E. Cohen, S. Landauer, H. Orman, "Reverification of a Microprocessor," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., pp. 166-176, 1988
-
E. Cohen, S. Landauer, H. Orman, "Reverification of a Microprocessor," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Crocker, S.D.1
-
5
-
-
84937404797
-
-
32-43, 1985.
-
V.D. Gligor, "Analysis of the Hardware Verification of the Honeywell SCOMP," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., pp. 32-43, 1985.
-
"Analysis of the Hardware Verification of the Honeywell SCOMP," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Gligor, V.D.1
-
6
-
-
0025111912
-
-
333-344, 1990.
-
J.D. Guttman, Hai-P. Ko, "Verifying a Hardware Security Architecture," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., pp. 333-344, 1990.
-
Hai-P. Ko, "Verifying a Hardware Security Architecture," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Guttman, J.D.1
-
7
-
-
0026156690
-
-
8-20, 1991.
-
Wei-Ming Hu, "Reducing Timing Channels with Fuzzy Time," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., pp. 8-20, 1991.
-
"Reducing Timing Channels with Fuzzy Time," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Hu, W.-M.1
-
10
-
-
33747370970
-
-
241732, Intel Corporation, Santa Clara, Calif., 1994.
-
Microprocessors, Volume III: Pentium Processors, Order Number 241732, Intel Corporation, Santa Clara, Calif., 1994.
-
Microprocessors, Volume III: Pentium Processors, order Number
-
-
-
11
-
-
33747334945
-
-
230985, Intel Corporation, Santa Clara, Calif., 1989.
-
Intel386 Microprocessor Family Programmer's Reference Manual, Order Number 230985, Intel Corporation, Santa Clara, Calif., 1989.
-
Intel386 Microprocessor Family Programmer's Reference Manual, order Number
-
-
-
12
-
-
33747369677
-
-
240486-002, Intel Corporation, Santa Clara, Calif., 1992.
-
Intel486 Microprocessor Family Programmer's Reference Manual, Order Number 240486-002, Intel Corporation, Santa Clara, Calif., 1992.
-
Intel486 Microprocessor Family Programmer's Reference Manual, order Number
-
-
-
13
-
-
33747347889
-
-
3: Architecture and Programming Manual, Order Number 241430-001, Intel Corporation, Santa Clara, Calif., 1994.
-
Pentium Processor User's Manual, Volume 3: Architecture and Programming Manual, Order Number 241430-001, Intel Corporation, Santa Clara, Calif., 1994.
-
Pentium Processor User's Manual, Volume
-
-
-
14
-
-
33747366171
-
-
242480-001, Intel Corporation, Santa Clara, Calif., 1995.
-
Pentium Processor Specification Update, Order Number 242480-001, Intel Corporation, Santa Clara, Calif., 1995.
-
Pentium Processor Specification Update, order Number
-
-
-
15
-
-
33747360223
-
-
1988
-
J.J. Joyce, "Formal Verification and Implementation of a Microprocessor," G. Birtwistle and P.A. Subrahamanyam, eds., VLSI Specification, Verification, and Synthesis. Kluwer Academic Press, 1988
-
"Formal Verification and Implementation of a Microprocessor," G. Birtwistle and P.A. Subrahamanyam, Eds., VLSI Specification, Verification, and Synthesis. Kluwer Academic Press
-
-
Joyce, J.J.1
-
18
-
-
0015672289
-
-
16, no. 10, pp. 613-615, Oct. 1973.
-
B.W. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, no. 10, pp. 613-615, Oct. 1973.
-
"A Note on the Confinement Problem," Comm. ACM, Vol.
-
-
Lampson, B.W.1
-
19
-
-
0028514027
-
-
26, no. 3, pp. 211-254, Sept. 1994.
-
C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi, "A Taxonomy of Computer Program Security Flaws, with Examples," Computing Surveys, vol. 26, no. 3, pp. 211-254, Sept. 1994.
-
A.R. Bull, J.P. McDermott, and W.S. Choi, "A Taxonomy of Computer Program Security Flaws, with Examples," Computing Surveys, Vol.
-
-
Landwehr, C.E.1
-
20
-
-
33747370446
-
-
337-360, North-Holland. 1992.
-
B. Levy, I. Filippenko, L. Marcus, and T. Menas, "Using the State Delta Verification System (SDVS) for Hardware Verification," Theorem Provers in Circuit Design, pp. 337-360, North-Holland. 1992.
-
I. Filippenko, L. Marcus, and T. Menas, "Using the State Delta Verification System (SDVS) for Hardware Verification," Theorem Provers in Circuit Design, Pp.
-
-
Levy, B.1
-
21
-
-
33747354150
-
-
19, no. 7, pp. 191-192, July 1994.
-
T. Mathisen, "Pentium Secrets," Byte Magazine, vol. 19, no. 7, pp. 191-192, July 1994.
-
"Pentium Secrets," Byte Magazine, Vol.
-
-
Mathisen, T.1
-
22
-
-
33747375469
-
-
184-193, 1992.
-
N. McAuliffe, "Extending Our Hardware Base: A Worked Example," Proc. National Computer Security Conf., Baltimore, Md, pp. 184-193, 1992.
-
"Extending Our Hardware Base: a Worked Example," Proc. National Computer Security Conf., Baltimore, Md, Pp.
-
-
McAuliffe, N.1
-
24
-
-
33747356543
-
-
99 articles from Microprocessor Report. Emeryville, Calif., Ziff-Davis Press, 1993
-
Understanding x86 Microprocessors, (A collection of 99 articles from Microprocessor Report). Emeryville, Calif., Ziff-Davis Press, 1993
-
Microprocessors, A Collection of
-
-
-
25
-
-
33747341638
-
-
1986.
-
Final Evaluation Report: Honeywell Multics Release MR11.0, National Computer Security Center, NCSC Report CSC-EPL-85/003, Library No. S227,783, June 1986.
-
Report: Honeywell Multics Release MR11.0, National Computer Security Center, NCSC Report CSC-EPL-85/003, Library No. S227,783, June
-
-
Evaluation, F.1
-
27
-
-
33747329664
-
-
184-193, 1994.
-
E.J. Sebes, N. Kelem, T.C.V. Benzel, M. Bernstein, E. Cohen, J. Jones, J. King, M. Barnett, D.M. Gallon, and R. Zacjew, "The Architecture of Triad: A Distributed, Real-Time, Trusted System," Proc. National Computer Security Conf., Baltimore, Md, pp. 184-193, 1994.
-
N. Kelem, T.C.V. Benzel, M. Bernstein, E. Cohen, J. Jones, J. King, M. Barnett, D.M. Gallon, and R. Zacjew, "The Architecture of Triad: a Distributed, Real-Time, Trusted System," Proc. National Computer Security Conf., Baltimore, Md, Pp.
-
-
Sebes, E.J.1
-
28
-
-
0029210672
-
-
80x86 Processor Architecture: Pitfalls for Secure Systems," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 211-222, 1995.
-
O. Sibert, P.A. Porras, and R. Lindell, "The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 211-222, 1995.
-
P.A. Porras, and R. Lindell, "The Intel
-
-
Sibert, O.1
-
29
-
-
33747348743
-
-
1995.
-
M.K. Srivas and S.P. Miller, "Applying Formal Verification Lo a Commercial Microprocessor," Proc. IFIP International Conf. Computer Hardware Description Languages, Chiba, Japan, 1995.
-
And S.P. Miller, "Applying Formal Verification Lo a Commercial Microprocessor," Proc. IFIP International Conf. Computer Hardware Description Languages, Chiba, Japan
-
-
Srivas, M.K.1
-
30
-
-
37849021744
-
-
80386 Programming Techniques. Berkeley, Calif.: Osbourne McGraw-Hill, 1988.
-
J.L. Turley, Advanced 80386 Programming Techniques. Berkeley, Calif.: Osbourne McGraw-Hill, 1988.
-
Advanced
-
-
Turley, J.L.1
-
32
-
-
0025028343
-
-
345-357, 1990
-
P.J. Windley, "A Hierarchical Methodology for Verifying Microprogrammed Microprocessors," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., pp. 345-357, 1990
-
"A Hierarchical Methodology for Verifying Microprogrammed Microprocessors," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Windley, P.J.1
-
33
-
-
0026155357
-
-
2-7, 1991.
-
J.C. Wray, "An Analysis of Covert Timing Channels," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., pp. 2-7, 1991.
-
"An Analysis of Covert Timing Channels," Proc. IEEE Computer Society Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Wray, J.C.1
|