메뉴 건너뛰기




Volumn 22, Issue 5, 1996, Pages 283-293

An analysis of the intel 80x86 security architecture and implementations

Author keywords

Computer security; Covert channels; Hardware implementation error; Hardware security architecture; Microprocessor; Penetration testing

Indexed keywords


EID: 33747367779     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.502221     Document Type: Article
Times cited : (12)

References (33)
  • 13
    • 33747347889 scopus 로고    scopus 로고
    • 3: Architecture and Programming Manual, Order Number 241430-001, Intel Corporation, Santa Clara, Calif., 1994.
    • Pentium Processor User's Manual, Volume 3: Architecture and Programming Manual, Order Number 241430-001, Intel Corporation, Santa Clara, Calif., 1994.
    • Pentium Processor User's Manual, Volume
  • 24
    • 33747356543 scopus 로고    scopus 로고
    • 99 articles from Microprocessor Report. Emeryville, Calif., Ziff-Davis Press, 1993
    • Understanding x86 Microprocessors, (A collection of 99 articles from Microprocessor Report). Emeryville, Calif., Ziff-Davis Press, 1993
    • Microprocessors, A Collection of
  • 28
    • 0029210672 scopus 로고    scopus 로고
    • 80x86 Processor Architecture: Pitfalls for Secure Systems," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 211-222, 1995.
    • O. Sibert, P.A. Porras, and R. Lindell, "The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 211-222, 1995.
    • P.A. Porras, and R. Lindell, "The Intel
    • Sibert, O.1
  • 30
    • 37849021744 scopus 로고    scopus 로고
    • 80386 Programming Techniques. Berkeley, Calif.: Osbourne McGraw-Hill, 1988.
    • J.L. Turley, Advanced 80386 Programming Techniques. Berkeley, Calif.: Osbourne McGraw-Hill, 1988.
    • Advanced
    • Turley, J.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.