메뉴 건너뛰기




Volumn , Issue , 2019, Pages 225-240

Hardware enforcement of application security policies using tagged memory

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; HARDWARE SECURITY; SECURITY SYSTEMS; SYSTEMS ANALYSIS; UNIX;

EID: 77952337533     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (63)

References (36)
  • 9
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • San Diego, CA, June
    • M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In Proc. of the 34th ISCA, San Diego, CA, June 2007.
    • (2007) Proc. Of the 34th ISCA
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 13
    • 85080661327 scopus 로고    scopus 로고
    • IBM Corporation. IBM system i. http://www-03.ibm.com/systems/i.
    • IBM System I
  • 14
    • 33746900101 scopus 로고    scopus 로고
    • Intel Corporation. Intel i960 processors. http://developer.intel.com/design/i960/.
    • Intel I960 Processors
  • 17
    • 33845403940 scopus 로고    scopus 로고
    • Building secure high-performance web services with OKWS
    • June-July
    • M. Krohn. Building secure high-performance web services with OKWS. In Proc. of the 2004 USENIX, June-July 2004.
    • (2004) Proc. Of the 2004 USENIX
    • Krohn, M.1
  • 19
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. P. Wobber. Authentication in distributed systems: Theory and practice. ACM TOCS, 10(4):265-310, 1992.
    • (1992) ACM TOCS , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.P.4
  • 21
    • 77649281635 scopus 로고    scopus 로고
    • How low can you go? Recommendations for hardware-supported minimal TCB code execution
    • Seattle, WA, March
    • J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. How low can you go? Recommendations for hardware-supported minimal TCB code execution. In Proc. of the 13th ASPLOS, Seattle, WA, March 2008.
    • (2008) Proc. Of the 13th ASPLOS
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Seshadri, A.5
  • 22
    • 33645766952 scopus 로고    scopus 로고
    • PITAC. February
    • President's Information Technology Advisory Committee (PITAC). Cybersecurity: A crisis of prioritization. http://www.nitrd.gov/pitac/reports/20050301 cybersecurity/cybersecurity.pdf, February 2005.
    • (2005) Cybersecurity: A Crisis of Prioritization
  • 23
    • 85041481084 scopus 로고
    • Design and verification of secure systems
    • Pacific Grove, CA, December
    • J. M. Rushby. Design and verification of secure systems. In Proc. of the 8th SOSP, pages 12-21, Pacific Grove, CA, December 1981.
    • (1981) Proc. Of the 8th SOSP , pp. 12-21
    • Rushby, J.M.1
  • 25
    • 0015315880 scopus 로고
    • A hardware architecture for implementing protection rings
    • M. D. Schroeder and J. H. Saltzer. A hardware architecture for implementing protection rings. Comm. of the ACM, 15(3):157-170, 1972.
    • (1972) Comm. Of the ACM , vol.15 , Issue.3 , pp. 157-170
    • Schroeder, M.D.1    Saltzer, J.H.2
  • 26
    • 41149103393 scopus 로고    scopus 로고
    • Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
    • October
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proc. of the 21st SOSP, pages 335-350, October 2007.
    • (2007) Proc. Of the 21st SOSP , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 28
    • 33748870010 scopus 로고    scopus 로고
    • Infoshield: A security architecture for protecting information usage in memory
    • Austin, TX, February
    • W. Shi, H.-H. Lee, G. Gu, L. Falk, T. Mudge, and M. Ghosh. InfoShield: A security architecture for protecting information usage in memory. In Proc. of the 12th HPCA, Austin, TX, February 2006.
    • (2006) Proc. Of the 12th HPCA
    • Shi, W.1    Lee, H.-H.2    Gu, G.3    Falk, L.4    Mudge, T.5    Ghosh, M.6
  • 29
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Boston, MA, October
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. of the 11th ASPLOS, Boston, MA, October 2004.
    • (2004) Proc. Of the 11th ASPLOS
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 30
    • 16644400693 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. ACM TOCS, 23(1), 2005.
    • (2005) ACM TOCS , vol.23 , Issue.1
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 31
    • 85069458084 scopus 로고    scopus 로고
    • Splitting interfaces: Making trust between applications and operating systems configurable
    • Seattle, WA, November
    • R. Ta-Min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In Proc. of the 7th OSDI, pages 279-292, Seattle, WA, November 2006.
    • (2006) Proc. Of the 7th OSDI , pp. 279-292
    • Ta-Min, R.1    Litty, L.2    Lie, D.3
  • 34
    • 33845435188 scopus 로고    scopus 로고
    • Mondrix: Memory isolation for linux using mondriaan memory protection
    • October
    • E. Witchel, J. Rhee, and K. Asanovic. Mondrix: Memory isolation for linux using mondriaan memory protection. In Proc. of the 20th SOSP, pages 31-44, October 2005.
    • (2005) Proc. Of the 20th SOSP , pp. 31-44
    • Witchel, E.1    Rhee, J.2    Asanovic, K.3
  • 36
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • San Francisco, CA, April
    • N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In Proc. of the 5th NSDI, pages 293-308, San Francisco, CA, April 2008.
    • (2008) Proc. Of the 5th NSDI , pp. 293-308
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazières, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.