-
1
-
-
79959904459
-
-
90nm generic CMOS library, Synopsys Inc.
-
90nm generic CMOS library, Synopsys University program, Synopsys Inc.
-
Synopsys University Program
-
-
-
4
-
-
80052534641
-
-
What does CC EAL6+ mean? http://www.ok-labs.com/blog/entry/what-does-cc- eal6-mean/.
-
What Does CC EAL6+ Mean?
-
-
-
8
-
-
0033702592
-
Transforming out timing leaks
-
New York, NY, USA, ACM
-
J. Agat. Transforming out timing leaks. In Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL '00, pages 40-53, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '00
, pp. 40-53
-
-
Agat, J.1
-
12
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In Micro, pages 221-232, 2004.
-
(2004)
Micro
, pp. 221-232
-
-
Crandall, J.R.1
Chong, F.T.2
-
13
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In ISCA, pages 482-493, 2007.
-
(2007)
ISCA
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
16
-
-
0026992712
-
Linear continuations
-
New York, NY, USA, ACM
-
A. Filinski. Linear continuations. In Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL '92, pages 27-38, New York, NY, USA, 1992. ACM.
-
(1992)
Proceedings of the 19th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '92
, pp. 27-38
-
-
Filinski, A.1
-
17
-
-
84865659111
-
Cryptographically sound implementations for typed information-flow security
-
C. Fournet and T. Rezk. Cryptographically sound implementations for typed information-flow security. In POPL, pages 323-335, 2008.
-
(2008)
POPL
, pp. 323-335
-
-
Fournet, C.1
Rezk, T.2
-
20
-
-
0023365727
-
Statecharts: A visual formalism for complex systems
-
D. Harel. Statecharts: A visual formalism for complex systems. Science of Computer Programming 8, 1987.
-
(1987)
Science of Computer Programming
, vol.8
-
-
Harel, D.1
-
22
-
-
84958768388
-
Checking safety properties of behavioral VHDL descriptions by abstract interpretation
-
Springer
-
C. Hymans. Checking safety properties of behavioral VHDL descriptions by abstract interpretation. In International Static Analysis Symposium, pages 444-460. Springer, 2002.
-
(2002)
International Static Analysis Symposium
, pp. 444-460
-
-
Hymans, C.1
-
23
-
-
0142245446
-
Design and implementation of an abstract interpreter for VHDL
-
D.Geist and E.Tronci, editors, CHARME
-
C. Hymans. Design and implementation of an abstract interpreter for VHDL. D.Geist and E.Tronci, editors, CHARME, 2860 of LNCS, 2003.
-
(2003)
LNCS
, vol.2860
-
-
Hymans, C.1
-
24
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: formal verification of an OS kernel. In SOSP, pages 207-220, 2009.
-
(2009)
SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
26
-
-
70349236164
-
Deconstructing new cache designs for thwarting software cache-based side channel attacks
-
J. Kong, O. Aciiçmez, J.-P. Seifert, and H. Zhou. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In Proc. of the 2nd ACM workshop on Computer security architectures, pages 25-34, 2008.
-
(2008)
Proc. of the 2nd ACM Workshop on Computer Security Architectures
, pp. 25-34
-
-
Kong, J.1
Aciiçmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
27
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. IEEE Symposium on Security and Privacy, pages 447-462, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
28
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. Frans, K. Eddie, and K. R. Morris. Information flow control for standard OS abstractions. In SOSP, 2007.
-
(2007)
SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Frans, M.5
Eddie, K.6
Morris, K.R.7
-
31
-
-
77954898631
-
Secure information flow analysis for hardware design: Using the right abstraction for the job
-
X. Li, M. Tiwari, B. Hardekopf, T. Sherwood, and F. T. Chong. Secure information flow analysis for hardware design: Using the right abstraction for the job. The Fifth ACM SIGPLAN Workshop on Programming Languages and Analysis for Security(PLAS), June 2010.
-
The Fifth ACM SIGPLAN Workshop on Programming Languages and Analysis for Security(PLAS), June 2010
-
-
Li, X.1
Tiwari, M.2
Hardekopf, B.3
Sherwood, T.4
Chong, F.T.5
-
32
-
-
47349122373
-
Stall-time fair memory access scheduling for chip multiprocessors
-
O. Mutlu and T. Moscibroda. Stall-time fair memory access scheduling for chip multiprocessors. In Micro, pages 146-160, 2007.
-
(2007)
Micro
, pp. 146-160
-
-
Mutlu, O.1
Moscibroda, T.2
-
34
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
36
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H.-s. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Micro, pages 135-148, 2006.
-
(2006)
Micro
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
38
-
-
57349118429
-
Parallelizing dynamic information flow tracking
-
O. Ruwase, P. B. Gibbons, T. C. Mowry, V. Ramachandran, S. Chen, M. Kozuch, and M. Ryan. Parallelizing dynamic information flow tracking. In SPAA, pages 35-45, 2008.
-
(2008)
SPAA
, pp. 35-45
-
-
Ruwase, O.1
Gibbons, P.B.2
Mowry, T.C.3
Ramachandran, V.4
Chen, S.5
Kozuch, M.6
Ryan, M.7
-
41
-
-
33747367779
-
An analysis of the intel 80x86 security architecture and implementations
-
O. Sibert, P. A. Porras, and R. Lindell. An analysis of the intel 80x86 security architecture and implement ations. IEEE Transactions on Software Engineering, 22(5):283-293, 1996. (Pubitemid 126771670)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 283-293
-
-
Sibert, O.1
Porras, P.A.2
Lindell, R.3
-
43
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, pages 85-96, 2004.
-
(2004)
ASPLOS
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
44
-
-
77954912866
-
-
version v7.30 - initial IEEE standardization proposal edition
-
E. Technologies. The Esterel v7 Reference Manual, version v7.30 - initial IEEE standardization proposal edition. 2005.
-
(2005)
The Esterel V7 Reference Manual
-
-
Technologies, E.1
-
45
-
-
76749092676
-
Execution leases: A hardware-supported mechanism for enforcing strong non-interference
-
M. Tiwari, X. Li, H. Wassel, F. Chong, and T. Sherwood. Execution leases: A hardware-supported mechanism for enforcing strong non-interference. In Micro, 2009.
-
(2009)
Micro
-
-
Tiwari, M.1
Li, X.2
Wassel, H.3
Chong, F.4
Sherwood, T.5
-
46
-
-
67650085261
-
Complete information flow tracking from the gates up
-
March
-
M. Tiwari, H.Wassel, B. Mazloom, S. Mysore, F. Chong, and T. Sherwood. Complete information flow tracking from the gates up. In ASPLOS, March 2009.
-
(2009)
ASPLOS
-
-
Tiwari, M.1
Wassel, H.2
Mazloom, B.3
Mysore, S.4
Chong, F.5
Sherwood, T.6
-
49
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In Micro, pages 243-254, 2004.
-
(2004)
Micro
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
50
-
-
52649094619
-
Flexi-Taint: A programmable accelerator for dynamic taint propagation
-
G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. Flexi-Taint: A programmable accelerator for dynamic taint propagation. In HPCA, pages 196-206, 2008.
-
(2008)
HPCA
, pp. 196-206
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
Prvulovic, M.4
-
51
-
-
0030370740
-
A sound type system for secure flow analysis
-
January
-
D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. J. Comput. Secur., 4:167-187, January 1996.
-
(1996)
J. Comput. Secur.
, vol.4
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
54
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
New York, NY, USA, ACM
-
Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In ISCA, pages 494-505, New York, NY, USA, 2007. ACM.
-
(2007)
ISCA
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
57
-
-
85094632142
-
Security distributed systems with information flow control
-
Apr.
-
N. Zeldovich, S. Boyd-Wickizer, and D.Mazieres. Security distributed systems with information flow control. In NSDI, pages 293-308, Apr. 2008.
-
(2008)
NSDI
, pp. 293-308
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazieres, D.3
-
59
-
-
77954997106
-
Hardware enforcement of application security policies using tagged memory
-
Dec.
-
N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies using tagged memory. In OSDI, Dec. 2008.
-
(2008)
OSDI
-
-
Zeldovich, N.1
Kannan, H.2
Dalton, M.3
Kozyrakis, C.4
|