-
2
-
-
76749106902
-
-
What does cc eal6+ mean? http://www.oklabs.com/blog/entry/what-does-cc- eal6-mean/.
-
What does cc eal6+ mean
-
-
-
3
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
February
-
James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS '05), February 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS '05)
-
-
Newsome, J.1
Song, D.2
-
5
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
New York, NY, USA, ACM
-
J. Clause, W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In ISSTA '07: Proceedings of the 2007 international symposium on Software testing and analysis, pages 196-206, New York, NY, USA, 2007. ACM.
-
(2007)
ISSTA '07: Proceedings of the 2007 international symposium on Software testing and analysis
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
6
-
-
21644482450
-
Minos: Control Data Attack Prevention Orthogonal to Memory Model
-
Washington, DC, USA, IEEE Computer Society
-
J. R. Crandall and F. T. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. In MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, pages 221-232, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
, pp. 221-232
-
-
Crandall, J.R.1
Chong, F.T.2
-
9
-
-
76749145432
-
-
D. Federal Aviation Administration (FAA). Boeing model 787-8 airplane; systems and data networks security - isolation or protection from unauthorized passenger domain systems access. http://cryptome.info/faa010208.htm.
-
D. Federal Aviation Administration (FAA). Boeing model 787-8 airplane; systems and data networks security - isolation or protection from unauthorized passenger domain systems access. http://cryptome.info/faa010208.htm.
-
-
-
-
10
-
-
0026254933
-
A retrospective on the vax vmm security kernel
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the vax vmm security kernel. IEEE Trans. Softw. Eng., 17(11):1147-1165, 1991.
-
(1991)
IEEE Trans. Softw. Eng
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
11
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
R. A. Kemmerer. Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Transactions on Computer Systems, 1(3):256-277, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
12
-
-
84943632039
-
Timing attacks on implementations of diffe-hellman, rsa, dss, and other systems
-
London, UK, Springer-Verlag
-
P. C. Kocher. Timing attacks on implementations of diffe-hellman, rsa, dss, and other systems. In CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pages 104-113, London, UK, 1996. Springer-Verlag.
-
(1996)
CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.C.1
-
14
-
-
57749192483
-
Information flow control for standard os abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard os abstractions. SIGOPS Oper. Syst. Rev., 41(6):321-334, 2007.
-
(2007)
SIGOPS Oper. Syst. Rev
, vol.41
, Issue.6
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
15
-
-
0015672289
-
A note on the confinement problem
-
B. Lampson. A note on the confinement problem. CACM, 16(10):613-615, 1973.
-
(1973)
CACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
16
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
R. B. Lee, P. C. S. Kwan, J. P. Mcgregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture (ISCA)
-
-
Lee, R.B.1
Kwan, P.C.S.2
Mcgregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
18
-
-
0039927533
-
Architectural Support for Copy and Tamper Resistant Software
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In Architectural Support for Programming Languages and Operating Systems, pages 168-177, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
19
-
-
48249125979
-
Formal construction of the mathematically analyzed separation kernel
-
W. Martin, P. White, F. Taylor, and A. Goldberg. Formal construction of the mathematically analyzed separation kernel. Automated Software Engineering, International Conference on, 0:133, 2000.
-
(2000)
Automated Software Engineering, International Conference on
, vol.0
, pp. 133
-
-
Martin, W.1
White, P.2
Taylor, F.3
Goldberg, A.4
-
22
-
-
76749098439
-
-
A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java information flow. Software release. http://www.cs.cornell.edu/jif, July 2001.
-
A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java information flow. Software release. http://www.cs.cornell.edu/jif, July 2001.
-
-
-
-
25
-
-
70450227330
-
Laminar: Practical fine-grained decentralized information flow control
-
Dublin, June
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical fine-grained decentralized information flow control. In Proceedings of ACM SIGPLAN 2009 Conference on Programming Language Design and Implementation (PLDI 2009), Dublin, June 2009.
-
(2009)
Proceedings of ACM SIGPLAN 2009 Conference on Programming Language Design and Implementation (PLDI 2009)
-
-
Roy, I.1
Porter, D.E.2
Bond, M.D.3
McKinley, K.S.4
Witchel, E.5
-
26
-
-
57349118429
-
Parallelizing dynamic information flow tracking
-
New York, NY, USA, ACM
-
O. Ruwase, P. B. Gibbons, T. C. Mowry, V. Ramachandran, S. Chen, M. Kozuch, and M. Ryan. Parallelizing dynamic information flow tracking. In SPAA '08: Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, pages 35-45, New York, NY, USA, 2008. ACM.
-
(2008)
SPAA '08: Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures
, pp. 35-45
-
-
Ruwase, O.1
Gibbons, P.B.2
Mowry, T.C.3
Ramachandran, V.4
Chen, S.5
Kozuch, M.6
Ryan, M.7
-
28
-
-
33747367779
-
An analysis of the intel 80x86 security architecture and implementations
-
O. Sibert, P. A. Porras, and R. Lindell. An analysis of the intel 80x86 security architecture and implementations. IEEE Transactions on Software Engineering, 22(5):283-293, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 283-293
-
-
Sibert, O.1
Porras, P.A.2
Lindell, R.3
-
29
-
-
37149044968
-
Aegis: A single-chip secure processor
-
Nov.-Dec
-
G. Suh, C. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. Design and Test of Computers, IEEE, 24(6):570-580, Nov.-Dec. 2007.
-
(2007)
Design and Test of Computers, IEEE
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.1
O'Donnell, C.2
Devadas, S.3
-
30
-
-
12844267418
-
Secure Program Execution via Dynamic Information Flow Tracking
-
New York, NY, USA, ACM Press
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pages 85-96, New York, NY, USA, 2004. ACM Press.
-
(2004)
ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
31
-
-
67650085261
-
Complete information flow tracking from the gates up
-
M. Tiwari, H. Wassel, B. Mazloom, S. Mysore, F. Chong, and T. Sherwood. Complete information flow tracking from the gates up. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2009.
-
(2009)
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Tiwari, M.1
Wassel, H.2
Mazloom, B.3
Mysore, S.4
Chong, F.5
Sherwood, T.6
-
32
-
-
76749099180
-
Series Library. A guide to understanding covert channel analysis of trusted systems, version 1
-
Technical Report NCSC-TG-030, Library No. S-240,572
-
TSEC Rainbow Series Library. A guide to understanding covert channel analysis of trusted systems, version 1. Technical Report NCSC-TG-030, Library No. S-240,572, 1993.
-
(1993)
-
-
Rainbow, T.S.E.C.1
-
33
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
IEEE Computer Society
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, pages 243-254. IEEE Computer Society, 2004.
-
(2004)
MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
34
-
-
57749197593
-
Flexitaint: A programmable accelerator for dynamic taint propagation
-
New York, NY, USA, ACM
-
G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. Flexitaint: A programmable accelerator for dynamic taint propagation. In Fourteenth International Symposium on High Performance Computer Architecture (HPCA), pages 196-206, New York, NY, USA, 2008. ACM.
-
(2008)
Fourteenth International Symposium on High Performance Computer Architecture (HPCA)
, pp. 196-206
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
Prvulovic, M.4
-
35
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
|