메뉴 건너뛰기




Volumn , Issue , 2007, Pages 10-19

Augmenting branch predictor to secure program execution

Author keywords

Bloom filter; Branch predictor; Control flow validation; Indirect branch; Software protection

Indexed keywords

BLOOM FILTER; BRANCH PREDICTOR; CONTROL FLOW VALIDATION; INDIRECT BRANCH; SOFTWARE PROTECTION;

EID: 36049008184     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2007.19     Document Type: Conference Paper
Times cited : (14)

References (29)
  • 1
    • 36049003614 scopus 로고    scopus 로고
    • M. Abadi, M. Budiu, U. Erlingsson and J. Ligatti, Control_flow Integrity, in ACM CSS05, Nov, 2005.
    • M. Abadi, M. Budiu, U. Erlingsson and J. Ligatti, "Control_flow Integrity", in ACM CSS05, Nov, 2005.
  • 2
    • 0003465202 scopus 로고    scopus 로고
    • Univ. of Wisconsin CS Dept. Technical Report, No. 1342
    • June
    • T. Austin and D. Burger, "The SimpleScalar Tool Set". Univ. of Wisconsin CS Dept. Technical Report, No. 1342, June 1997.
    • (1997)
    • Austin, T.1    Burger, D.2
  • 5
    • 0014814325 scopus 로고
    • Space/Time Tradeoffs in Hash Coding with Allowable Errors, in
    • B. Bloom, "Space/Time Tradeoffs in Hash Coding with Allowable Errors", in Communications of the ACM 13:7, 1970
    • (1970) Communications of the ACM , vol.13 , pp. 7
    • Bloom, B.1
  • 6
    • 0030149507 scopus 로고    scopus 로고
    • CACTI: An enhanced cache access and cycle time model
    • May
    • S. Wilton, N. Jouppi, "CACTI: An enhanced cache access and cycle time model", IEEE JSSC, Vol. 31(5) May, 1996.
    • (1996) IEEE JSSC , vol.31 , Issue.5
    • Wilton, S.1    Jouppi, N.2
  • 15
    • 14844297052 scopus 로고    scopus 로고
    • Gray-Box Extraction of Execution Graphs for Anomaly Detection
    • D. Gao, M. Reiter, D. Song, "Gray-Box Extraction of Execution Graphs for Anomaly Detection", in the ACM CCS conf, 2004.
    • (2004) the ACM CCS conf
    • Gao, D.1    Reiter, M.2    Song, D.3
  • 18
    • 33947731872 scopus 로고    scopus 로고
    • Microarchitectural Protection Against Buffer Overflow Attack
    • July
    • Y. Park, Z. Zhang, G. Lee, "Microarchitectural Protection Against Buffer Overflow Attack", IEEE Micro, July, 2006.
    • (2006) IEEE Micro
    • Park, Y.1    Zhang, Z.2    Lee, G.3
  • 24
  • 26
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry Attack on Host-based Intrusion detection system
    • Nov
    • D. Wagner and P. Soto, "Mimicry Attack on Host-based Intrusion detection system", In ACM CSS 02, Nov. 2002.
    • (2002) ACM CSS 02
    • Wagner, D.1    Soto, P.2
  • 28
    • 0027836605 scopus 로고
    • Alternative Implementations of Two-Level Adaptive Training Branch Prediction
    • T. Yeh and Y. Patt, "Alternative Implementations of Two-Level Adaptive Training Branch Prediction", in Proc. of the 19th ISCA, 1992.
    • (1992) Proc. of the 19th ISCA
    • Yeh, T.1    Patt, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.