메뉴 건너뛰기




Volumn , Issue , 2009, Pages 493-504

Execution leases: A hardware-supported mechanism for enforcing strong non-interference

Author keywords

Covert channels; Gate level information flow tracking; High assurance systems; Timing channels

Indexed keywords

COVERT CHANNELS; GATE LEVELS; HIGH ASSURANCE SYSTEMS; INFORMATION FLOWS; TIMING CHANNELS;

EID: 76749092676     PISSN: 10724451     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1669112.1669174     Document Type: Conference Paper
Times cited : (58)

References (37)
  • 2
    • 76749106902 scopus 로고    scopus 로고
    • What does cc eal6+ mean? http://www.oklabs.com/blog/entry/what-does-cc- eal6-mean/.
    • What does cc eal6+ mean
  • 3
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • February
    • James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS '05), February 2005.
    • (2005) 12th Annual Network and Distributed System Security Symposium (NDSS '05)
    • Newsome, J.1    Song, D.2
  • 9
    • 76749145432 scopus 로고    scopus 로고
    • D. Federal Aviation Administration (FAA). Boeing model 787-8 airplane; systems and data networks security - isolation or protection from unauthorized passenger domain systems access. http://cryptome.info/faa010208.htm.
    • D. Federal Aviation Administration (FAA). Boeing model 787-8 airplane; systems and data networks security - isolation or protection from unauthorized passenger domain systems access. http://cryptome.info/faa010208.htm.
  • 11
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • R. A. Kemmerer. Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Transactions on Computer Systems, 1(3):256-277, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 15
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. Lampson. A note on the confinement problem. CACM, 16(10):613-615, 1973.
    • (1973) CACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 22
    • 76749098439 scopus 로고    scopus 로고
    • A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java information flow. Software release. http://www.cs.cornell.edu/jif, July 2001.
    • A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java information flow. Software release. http://www.cs.cornell.edu/jif, July 2001.
  • 23
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of aes
    • Springer-Verlag
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of aes. In Topics in Cryptology - CT-RSA 2006, pages 1-20. Springer-Verlag, 2006.
    • (2006) Topics in Cryptology - CT-RSA 2006 , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 28
    • 33747367779 scopus 로고    scopus 로고
    • An analysis of the intel 80x86 security architecture and implementations
    • O. Sibert, P. A. Porras, and R. Lindell. An analysis of the intel 80x86 security architecture and implementations. IEEE Transactions on Software Engineering, 22(5):283-293, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 283-293
    • Sibert, O.1    Porras, P.A.2    Lindell, R.3
  • 32
    • 76749099180 scopus 로고
    • Series Library. A guide to understanding covert channel analysis of trusted systems, version 1
    • Technical Report NCSC-TG-030, Library No. S-240,572
    • TSEC Rainbow Series Library. A guide to understanding covert channel analysis of trusted systems, version 1. Technical Report NCSC-TG-030, Library No. S-240,572, 1993.
    • (1993)
    • Rainbow, T.S.E.C.1
  • 35


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.