-
1
-
-
77955221138
-
-
Maxtor basics personal storage 3200
-
Maxtor basics personal storage 3200. http: // www.Seagate.com/www/en-us/ support/downloads/personal-storage/ps3200-sw.
-
-
-
-
3
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
May
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using IC fingerprinting. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
5
-
-
2842568131
-
Internal architecture of Alpha 21164 microprocessor
-
P. Bannon and J. Keller. Internal architecture of Alpha 21164 microprocessor, compcon, 00:79, 1995.
-
(1995)
Compcon
, vol.0
, pp. 79
-
-
Bannon, P.1
Keller, J.2
-
6
-
-
0032630134
-
Symbolic model checking using SAT procedures instead of BDDs
-
A. Biere, A. Cimatti, E. Clarke, M. Fujita, and Y. Zhu. Symbolic model checking using SAT procedures instead of BDDs. In Proc. ACM/IEEE Annual Design Automation Conference, pages 317-320, 1999.
-
(1999)
Proc. ACM/IEEE Annual Design Automation Conference
, pp. 317-320
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Fujita, M.4
Zhu, Y.5
-
8
-
-
77955212744
-
-
BugTraq Mailing List. Irssi 0.8.4 backdoor, May
-
BugTraq Mailing List. Irssi 0.8.4 backdoor, May 2002. http://archives.neohapsis.com/archives/ bugtraq/2002-05/0222.html.
-
(2002)
-
-
-
10
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
New York, NY, USA, ACM
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. Exe: automatically generating inputs of death. In CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 322-335, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
11
-
-
77955214175
-
-
CERT. Cert advisory ca-2002-24 trojan horse openssh distribution. Technical report, CERT Coordination Center
-
CERT. Cert advisory ca-2002-24 trojan horse openssh distribution. Technical report, CERT Coordination Center, 2002. http://www.cert.org/ advisories/CA-2002-24.html.
-
(2002)
-
-
-
12
-
-
77955186055
-
-
CERT. Cert advisory ca-2002-28 trojan horse sendmail distribution. Technical report, CERT Coordination Center
-
CERT. Cert advisory ca-2002-28 trojan horse sendmail distribution. Technical report, CERT Coordination Center, 2002. http://www.cert.org/ advisories/CA-2002-28.html.
-
(2002)
-
-
-
14
-
-
84943385246
-
The transmeta code morphing software: Using speculation, recovery, and adapative retranslation to address real-life challenges
-
Mar
-
J. C. Dehnert, B. K. Grant, J. P. Banning, R. Johnson, T. K. A. Klaiber, and J. Mattson. The transmeta code morphing software: Using speculation, recovery, and adapative retranslation to address real-life challenges. In Proceedings of the 1st IEEE/ACM Symposium of Code Generation and Optimization, Mar 2003.
-
(2003)
Proceedings of the 1st IEEE/ACM Symposium of Code Generation and Optimization
-
-
Dehnert, J.C.1
Grant, B.K.2
Banning, J.P.3
Johnson, R.4
Klaiber, T.K.A.5
Mattson, J.6
-
15
-
-
77955179261
-
-
Gaisler Research. Leon3 synthesizable processor
-
Gaisler Research. Leon3 synthesizable processor. http://www.gaisler.com.
-
-
-
-
16
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA, ACM Press
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 148-160, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
17
-
-
34548728354
-
FPGA viruses
-
LNCS. Springer, August
-
I. Hadžić, S. Udani, and J. M. Smith. FPGA Viruses. In Proceedings of 9th International Workshop on FieldProgrammable Logic and Applications, FPL'99, LNCS. Springer, August 1999.
-
(1999)
Proceedings of 9th International Workshop on FieldProgrammable Logic and Applications, FPL'99
-
-
Hadžić, I.1
Udani, S.2
Smith, J.M.3
-
18
-
-
4043131877
-
Millicode in an IBM zSeries processor
-
L. C. Heller and M. S. Farrell. Millicode in an IBM zSeries processor. IBM J. Res. Dev., 48(3-4):425-434, 2004.
-
(2004)
IBM J. Res. Dev.
, vol.48
, Issue.3-4
, pp. 425-434
-
-
Heller, L.C.1
Farrell, M.S.2
-
19
-
-
34547340370
-
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems
-
Washington, DC, USA, IEEE Computer Society
-
T. Huff mire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, T. Levin, T. Nguyen, and C. Irvine. Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 281-295, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 281-295
-
-
Huff Mire, T.1
Brotherton, B.2
Wang, G.3
Sherwood, T.4
Kastner, R.5
Levin, T.6
Nguyen, T.7
Irvine, C.8
-
22
-
-
85084095841
-
Designing and implementing malicious hardware
-
April
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou. Designing and implementing malicious hardware. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008.
-
(2008)
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
24
-
-
77955218028
-
-
SPARC International Inc. SPARC v8 processor
-
SPARC International Inc. SPARC v8 processor. http://www.sparc.org.
-
-
-
-
26
-
-
84976781807
-
Reflections on trusting trust
-
K. Thompson. Reflections on trusting trust. Commun. ACM, 27(8):761-763, 1984.
-
(1984)
Commun. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
28
-
-
84885668018
-
Using model checking to find serious file system errors
-
Berkeley, CA, USA, USENIX Association
-
J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In OSDI'04: Proceedings of the 6th Symposium on Operating Systems Design & Implementation, pages 273-288, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
OSDI'04: Proceedings of the 6th Symposium on Operating Systems Design & Implementation
, pp. 273-288
-
-
Yang, J.1
Twohey, P.2
Engler, D.3
Musuvathi, M.4
|