-
2
-
-
34249779582
-
Architectural support for run-time validation of program data properties
-
May
-
D. Arora, S. Ravi, A. Raghunathan, N. Jha. Architectural Support for Run-Time Validation of Program Data Properties. IEEE Trans. VLSI systems, Vol. 15, No. 5, May, 2007.
-
(2007)
IEEE Trans. VLSI Systems
, vol.15
, Issue.5
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
-
4
-
-
0035339048
-
COTS-Based systems top 10 list
-
V. Basili and B. Boehm. COTS-Based systems top 10 list. IEEE Computer, Vol.34, No.5, pp.91-95, 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.5
, pp. 91-95
-
-
Basili, V.1
Boehm, B.2
-
8
-
-
80053199674
-
Microreboot: A technique for cheap recovery
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot: A Technique for Cheap Recovery. Proceedings of the International Symposium on Operating System Design and Implementation (OSDI), 2004.
-
(2004)
Proceedings of the International Symposium on Operating System Design and Implementation (OSDI)
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
9
-
-
84869663596
-
-
CERT sb04-357. Available at Dec.
-
CERT. US-CERT cyber security bulletin sb04-357. Available at http://www.uscert.gov/cas/bulletins/SB04-357.html, Dec. 2004.
-
(2004)
US-CERT Cyber Security Bulletin
-
-
-
11
-
-
65749098082
-
Embedded software: Facts, figures, and future
-
April
-
C. Ebert and C. Jones. Embedded Software: Facts, Figures, and Future, Computer, vol. 42, no. 4, pp. 42-52, April, 2009.
-
(2009)
Computer
, vol.42
, Issue.4
, pp. 42-52
-
-
Ebert, C.1
Jones, C.2
-
12
-
-
84962779213
-
Mibench: A free, commercially representative embedded benchmark suite
-
M.R. Guthaus, J.S. Ringenberg, D. Ernst, T.M. Austin, T. Mudge, and R.B. Brown, Mibench: A free, commercially representative embedded benchmark suite, IEEE 4th Annual Workshop on Workload Characterization (2001).
-
(2001)
IEEE 4th Annual Workshop on Workload Characterization
-
-
Guthaus, M.R.1
Ringenberg, J.S.2
Ernst, D.3
Austin, T.M.4
Mudge, T.5
Brown, R.B.6
-
14
-
-
70749121425
-
-
in preparation
-
E. Leontie, G. Bloom, B. Narahari, R. Simha, and J. Zambreno. Hardware-enforced fine-grained isolation of untrusted code. in preparation, 2009.
-
(2009)
Hardware-Enforced Fine-Grained Isolation of Untrusted Code
-
-
Leontie, E.1
Bloom, G.2
Narahari, B.3
Simha, R.4
Zambreno, J.5
-
15
-
-
70749136163
-
Solaris containers: A breakthrough approach to virtualization
-
February
-
C. Mackinnon. Solaris Containers: A Breakthrough Approach to Virtualization. Processor Magazine, Vol. 28, No. 8, p. 33, February 2006.
-
(2006)
Processor Magazine
, vol.28
, Issue.8
, pp. 33
-
-
Mackinnon, C.1
-
19
-
-
84871961892
-
-
reference IDs 38527 (Apple iTouch / iPhone TIFF Image Handling Privilege Escalation) and 19665 (Sony PSP Photo Viewer TIFF File Overflow)
-
Open-source Vulnerability Database (OSVDB), reference IDs 38527 (Apple iTouch / iPhone TIFF Image Handling Privilege Escalation) and 19665 (Sony PSP Photo Viewer TIFF File Overflow).
-
Open-source Vulnerability Database (OSVDB)
-
-
-
20
-
-
0036472436
-
ROC-1. Hardware support for recovery-oriented computing
-
February
-
D. Oppenheimer, A. Brown, J. Beck, D. Hettena, J. Kuroda, N. Treuhalt, and D. Patterson. ROC-1. Hardware Support for Recovery-Oriented Computing. IEEE Transactions on Computers, Vol. 51, No.2, pp. 100-107, February 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.2
, pp. 100-107
-
-
Oppenheimer, D.1
Brown, A.2
Beck, J.3
Hettena, D.4
Kuroda, J.5
Treuhalt, N.6
Patterson, D.7
-
21
-
-
33748501504
-
Smashguard: A hardware solution to prevent security attacks on the function return address
-
October
-
H. Ozdoganoglu, T. Vijaykumar, C. Brodley, B. Kuperman, and A. Jalote. Smashguard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. IEEE Transactions on Computers, Vol. 55, No. 10, pp. 1271-1281, October 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.10
, pp. 1271-1281
-
-
Ozdoganoglu, H.1
Vijaykumar, T.2
Brodley, C.3
Kuperman, B.4
Jalote, A.5
-
22
-
-
33644661238
-
Content-addressable memory (CAM) circuits and architectures: A tutorial and survey
-
K. Pagiamtzis and A. Sheikholesami. Content-addressable memory (CAM) circuits and architectures: a tutorial and survey, IEEE J. Solid-State Circuits, pp. 712-727, 2006.
-
(2006)
IEEE J. Solid-State Circuits
, pp. 712-727
-
-
Pagiamtzis, K.1
Sheikholesami, A.2
-
23
-
-
0004015896
-
-
University of California, Berkeley
-
D. Patterson, A. Brown, P. Broadwell, G. Candea, M. Chen, J. Cutler, P. Enriquez, A. Fox, E. Kiciman, M. Merzbacher, D. Oppenheimer, N. Sastry, W. Tetzlaff, J. Traupman, and N. Treuhaft. Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques and Case Studies. Technical Report CSD-02- 1175, University of California, Berkeley, 2002.
-
(2002)
Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques and Case Studies. Technical Report CSD-02- 1175
-
-
Patterson, D.1
Brown, A.2
Broadwell, P.3
Candea, G.4
Chen, M.5
Cutler, J.6
Enriquez, P.7
Fox, A.8
Kiciman, E.9
Merzbacher, M.10
Oppenheimer, D.11
Sastry, N.12
Tetzlaff, W.13
Traupman, J.14
Treuhaft, N.15
-
24
-
-
84869676691
-
-
The Richards Benchmark.http://research.sun.com/people/mario/java- benchmarking/.
-
The Richards Benchmark
-
-
-
25
-
-
33748870010
-
InfoShield: A security architecture for protecting information usage in memory
-
Feb.
-
W. Shi, J. Fryman, G. Gu, H-H. Lee, Y. Zhang, and J. Yang. InfoShield: A Security Architecture for Protecting Information Usage in memory. Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA), Feb. 2006.
-
(2006)
Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA)
-
-
Shi, W.1
Fryman, J.2
Gu, G.3
Lee, H.-H.4
Zhang, Y.5
Yang, J.6
-
26
-
-
51349108164
-
Memory-centric security architecture
-
W. Shi, C. Lu, and C. Lu. Memory-centric Security Architecture. High Performance Embedded Architectures and Compilers,Barcelona, Spain, November 17-18, 2005.
-
(2005)
High Performance Embedded Architectures and Compilers,Barcelona, Spain, November 17-18
-
-
Shi, W.1
Lu, C.2
Lu, C.3
-
28
-
-
33745200872
-
Improving the reliability of commodity operating systems
-
M. Swift, B. Bershad, and H. Levy. Improving the Reliability of Commodity Operating Systems. ACM Transactions on Computer Systems, Vol. 22, No. 4, 2004.
-
(2004)
ACM Transactions on Computer Systems
, vol.22
, Issue.4
-
-
Swift, M.1
Bershad, B.2
Levy, H.3
-
29
-
-
84869689506
-
-
Trusted Computing Group.
-
Trusted Computing Group. http://www.trustedcomputing.org.
-
-
-
-
31
-
-
0242671076
-
Janus: An approach for confinement of untrusted applications
-
UC Berkeley
-
D. Wagner. Janus: An Approach for Confinement of Untrusted Applications. Technical Report CSD-99-1056, UC Berkeley, 1999.
-
(1999)
Technical Report CSD-99-1056
-
-
Wagner, D.1
-
32
-
-
84948590819
-
Security and privacy in computer systems
-
W.H. Ware. Security and Privacy in Computer Systems, Proc. Spring Joint Computer Conf., Vol. 30, pp.287-290, 1967.
-
(1967)
Proc. Spring Joint Computer Conf.
, vol.30
, pp. 287-290
-
-
Ware, W.H.1
-
34
-
-
29144444415
-
Hardware assisted control flow obfuscation for embedded processors
-
September
-
X. Zhuang, T. Zhang, H-H. Lee, and S. Pande. Hardware Assisted Control Flow Obfuscation for Embedded Processors. Proceedings of the International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES), September 2004
-
(2004)
Proceedings of the International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES)
-
-
Zhuang, X.1
Zhang, T.2
Lee, H.-H.3
Pande, S.4
|