-
2
-
-
0033321638
-
DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design
-
Haifa, Israel, Nov
-
T. Austin. DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design. In the Proc. of the 32nd MICRO, Haifa, Israel, Nov. 1999.
-
(1999)
the Proc. of the 32nd MICRO
-
-
Austin, T.1
-
3
-
-
34547185267
-
Logs and Lifeguards: Accelerating Dynamic Program Monitoring
-
Technical Report IRP-TR-06-05, Intel Research, Pittsburgh, PA
-
S. Chen, B. Falsafi, et al. Logs and Lifeguards: Accelerating Dynamic Program Monitoring. Technical Report IRP-TR-06-05, Intel Research, Pittsburgh, PA, 2006.
-
(2006)
-
-
Chen, S.1
Falsafi, B.2
-
4
-
-
52649155221
-
Flexible Hardware Acceleration for Instruction-Grain Program Monitoring
-
Beijing, China, June
-
S. Chen, M. Kozuch, et al. Flexible Hardware Acceleration for Instruction-Grain Program Monitoring. In the Proc. of the 35th ISCA, Beijing, China, June 2008.
-
(2008)
the Proc. of the 35th ISCA
-
-
Chen, S.1
Kozuch, M.2
-
5
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
Yokohama, Japan, June
-
S. Chen, J. Xu, et al. Defeating Memory Corruption Attacks via Pointer Taintedness Detection. In the Proc. of the 35th DSN, Yokohama, Japan, June 2005.
-
(2005)
the Proc. of the 35th DSN
-
-
Chen, S.1
Xu, J.2
-
6
-
-
57749185043
-
Thread-Safe Dynamic Binary Translation using Transactional Memory
-
Salt Lake City, UT, Feb
-
J. Chung, M. Dalton, et al. Thread-Safe Dynamic Binary Translation using Transactional Memory. In the Proc. of the 14th HPCA, Salt Lake City, UT, Feb. 2008.
-
(2008)
the Proc. of the 14th HPCA
-
-
Chung, J.1
Dalton, M.2
-
7
-
-
21644482450
-
MINOS: Control Data Attack Prevention Orthogonal to Memory Model
-
Portland, OR, Dec
-
J. R. Crandall and F. T. Chong. MINOS: Control Data Attack Prevention Orthogonal to Memory Model. In the Proc. of the 37th MICRO, Portland, OR, Dec. 2004.
-
(2004)
the Proc. of the 37th MICRO
-
-
Crandall, J.R.1
Chong, F.T.2
-
8
-
-
35348907867
-
Raksha: A Flexible Information Flow Architecture for Software Security
-
San Diego, CA, June
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A Flexible Information Flow Architecture for Software Security. In the Proc. of the 34th ISCA, San Diego, CA, June 2007.
-
(2007)
the Proc. of the 34th ISCA
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
9
-
-
84863138534
-
Real-World Buffer Overflow Protection for Userspace and Kernelspace
-
San Jose, CA, July
-
M. Dalton, H. Kannan, and C. Kozyrakis. Real-World Buffer Overflow Protection for Userspace and Kernelspace. In the Proc. of the 17th Usenix Security Symposium, San Jose, CA, July 2008.
-
(2008)
the Proc. of the 17th Usenix Security Symposium
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. ACM Communications, 20(7), 1977.
-
(1977)
ACM Communications
, vol.20
, Issue.7
-
-
Denning, D.E.1
Denning, P.J.2
-
11
-
-
85180406262
-
Ostia: A Delegating Architecture for Secure System Call Interposition
-
San Diego, CA, Feb
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In the Proc. of the 11th NDSS, San Diego, CA, Feb. 2004.
-
(2004)
the Proc. of the 11th NDSS
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
12
-
-
70449935825
-
-
Intel Virtualization Technology (Intel VTx). http://www.intel.com/ technology/virtualization.
-
Intel Virtualization Technology (Intel VTx). http://www.intel.com/ technology/virtualization.
-
-
-
-
15
-
-
0023961238
-
Concurrent error detection using watchdog processors - a survey
-
A. Mahmood and E. J. McCluskey. Concurrent error detection using watchdog processors - a survey. IEEE Trans. on Computers, 37(2), 1988.
-
(1988)
IEEE Trans. on Computers
, vol.37
, Issue.2
-
-
Mahmood, A.1
McCluskey, E.J.2
-
16
-
-
77949699943
-
Dynamic Information Tracking on Multcores
-
Salt Lake City, UT, Feb
-
V. Nagarajan, H.Kim, et al. Dynamic Information Tracking on Multcores. In the Proc. of the 12th INTERACT, Salt Lake City, UT, Feb. 2008.
-
(2008)
the Proc. of the 12th INTERACT
-
-
Nagarajan, V.1
Kim, H.2
-
17
-
-
4544387534
-
An Architectural Framework for Providing Reliability and Security Support
-
Florence, Italy
-
N. Nakka, Z. Kalbarczyk, et al. An Architectural Framework for Providing Reliability and Security Support. In the Proc. of the 34th DSN, Florence, Italy, 2004.
-
(2004)
the Proc. of the 34th DSN
-
-
Nakka, N.1
Kalbarczyk, Z.2
-
18
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
San Diego, CA, Feb
-
J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In the Proc. of the 12th NDSS, San Diego, CA, Feb. 2005.
-
(2005)
the Proc. of the 12th NDSS
-
-
Newsome, J.1
Song, D.X.2
-
20
-
-
40349087553
-
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
-
Orlando, FL, Dec
-
F. Qin, C. Wang, et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In the Proc. of the 39th MICRO, Orlando, FL, Dec. 2006.
-
(2006)
the Proc. of the 39th MICRO
-
-
Qin, F.1
Wang, C.2
-
22
-
-
33748870010
-
InfoShield: A Security Architecture for Protecting Information Usage in Memory
-
Austin, TX
-
W. Shi, J. Fryman, et al. InfoShield: A Security Architecture for Protecting Information Usage in Memory. In the Proc. of the 12th HPCA, Austin, TX, 2006.
-
(2006)
the Proc. of the 12th HPCA
-
-
Shi, W.1
Fryman, J.2
-
23
-
-
70449749398
-
-
Personal communication with Shih-Lien Lu, Senior Prinicipal Researcher, Intel Microprocessor Technology Labs, Hillsboro, OR
-
Personal communication with Shih-Lien Lu, Senior Prinicipal Researcher, Intel Microprocessor Technology Labs, Hillsboro, OR.
-
-
-
-
24
-
-
84944113045
-
Secure Program Execution via Dynamic Information Flow Tracking
-
Boston, MA, Oct
-
G. E. Suh, J. W. Lee, et al. Secure Program Execution via Dynamic Information Flow Tracking. In the Proc. of the 11th ASPLOS, Boston, MA, Oct. 2004.
-
(2004)
the Proc. of the 11th ASPLOS
-
-
Suh, G.E.1
Lee, J.W.2
-
25
-
-
21644475650
-
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
-
Portland, OR, Dec
-
N. Vachharajani, M. J. Bridges, et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In the Proc. of the 37th MICRO, Portland, OR, Dec. 2004.
-
(2004)
the Proc. of the 37th MICRO
-
-
Vachharajani, N.1
Bridges, M.J.2
-
26
-
-
57749197593
-
FlexiTaint: A Programmable Accelerator for Dynamic Taint Propagation
-
Salt Lake City, UT, Feb
-
G. Venkataramani, I. Doudalis, et al. FlexiTaint: A Programmable Accelerator for Dynamic Taint Propagation. In the Proc. of the 14th HPCA, Salt Lake City, UT, Feb. 2008.
-
(2008)
the Proc. of the 14th HPCA
-
-
Venkataramani, G.1
Doudalis, I.2
-
27
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Vancouver, Canada, Aug
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In the Proc. of the 15th USENIX Security Symp., Vancouver, Canada, Aug. 2006.
-
(2006)
the Proc. of the 15th USENIX Security Symp
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|