메뉴 건너뛰기




Volumn , Issue , 2011, Pages 109-120

Caisson: A hardware description language for secure information flow

Author keywords

hardware description language; non interference; state machine

Indexed keywords

ABSTRACTING; CAISSONS; COMPUTER HARDWARE; FOUNDATIONS; HARDWARE SECURITY; INTEGRATED CIRCUIT DESIGN; PRESSURE VESSELS;

EID: 79959876833     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1993498.1993512     Document Type: Conference Paper
Times cited : (107)

References (59)
  • 1
    • 79959904459 scopus 로고    scopus 로고
    • 90nm generic CMOS library, Synopsys Inc.
    • 90nm generic CMOS library, Synopsys University program, Synopsys Inc.
    • Synopsys University Program
  • 4
  • 12
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In Micro, pages 221-232, 2004.
    • (2004) Micro , pp. 221-232
    • Crandall, J.R.1    Chong, F.T.2
  • 13
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In ISCA, pages 482-493, 2007.
    • (2007) ISCA , pp. 482-493
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 17
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • C. Fournet and T. Rezk. Cryptographically sound implementations for typed information-flow security. In POPL, pages 323-335, 2008.
    • (2008) POPL , pp. 323-335
    • Fournet, C.1    Rezk, T.2
  • 20
    • 0023365727 scopus 로고
    • Statecharts: A visual formalism for complex systems
    • D. Harel. Statecharts: A visual formalism for complex systems. Science of Computer Programming 8, 1987.
    • (1987) Science of Computer Programming , vol.8
    • Harel, D.1
  • 22
    • 84958768388 scopus 로고    scopus 로고
    • Checking safety properties of behavioral VHDL descriptions by abstract interpretation
    • Springer
    • C. Hymans. Checking safety properties of behavioral VHDL descriptions by abstract interpretation. In International Static Analysis Symposium, pages 444-460. Springer, 2002.
    • (2002) International Static Analysis Symposium , pp. 444-460
    • Hymans, C.1
  • 23
    • 0142245446 scopus 로고    scopus 로고
    • Design and implementation of an abstract interpreter for VHDL
    • D.Geist and E.Tronci, editors, CHARME
    • C. Hymans. Design and implementation of an abstract interpreter for VHDL. D.Geist and E.Tronci, editors, CHARME, 2860 of LNCS, 2003.
    • (2003) LNCS , vol.2860
    • Hymans, C.1
  • 32
    • 47349122373 scopus 로고    scopus 로고
    • Stall-time fair memory access scheduling for chip multiprocessors
    • O. Mutlu and T. Moscibroda. Stall-time fair memory access scheduling for chip multiprocessors. In Micro, pages 146-160, 2007.
    • (2007) Micro , pp. 146-160
    • Mutlu, O.1    Moscibroda, T.2
  • 34
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 36
    • 40349087553 scopus 로고    scopus 로고
    • Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin, C. Wang, Z. Li, H.-s. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Micro, pages 135-148, 2006.
    • (2006) Micro , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.-S.4    Zhou, Y.5    Wu, Y.6
  • 41
    • 33747367779 scopus 로고    scopus 로고
    • An analysis of the intel 80x86 security architecture and implementations
    • O. Sibert, P. A. Porras, and R. Lindell. An analysis of the intel 80x86 security architecture and implement ations. IEEE Transactions on Software Engineering, 22(5):283-293, 1996. (Pubitemid 126771670)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 283-293
    • Sibert, O.1    Porras, P.A.2    Lindell, R.3
  • 43
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, pages 85-96, 2004.
    • (2004) ASPLOS , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 44
    • 77954912866 scopus 로고    scopus 로고
    • version v7.30 - initial IEEE standardization proposal edition
    • E. Technologies. The Esterel v7 Reference Manual, version v7.30 - initial IEEE standardization proposal edition. 2005.
    • (2005) The Esterel V7 Reference Manual
    • Technologies, E.1
  • 45
    • 76749092676 scopus 로고    scopus 로고
    • Execution leases: A hardware-supported mechanism for enforcing strong non-interference
    • M. Tiwari, X. Li, H. Wassel, F. Chong, and T. Sherwood. Execution leases: A hardware-supported mechanism for enforcing strong non-interference. In Micro, 2009.
    • (2009) Micro
    • Tiwari, M.1    Li, X.2    Wassel, H.3    Chong, F.4    Sherwood, T.5
  • 48
    • 26844470115 scopus 로고    scopus 로고
    • Information flow analysis for VHDL
    • T. K. Tolstrup, F. Nielson, and H. R. Nielson. Information flow analysis for VHDL. volume 3606 of LNCS, 2005.
    • (2005) LNCS , vol.3606
    • Tolstrup, T.K.1    Nielson, F.2    Nielson, H.R.3
  • 50
    • 52649094619 scopus 로고    scopus 로고
    • Flexi-Taint: A programmable accelerator for dynamic taint propagation
    • G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. Flexi-Taint: A programmable accelerator for dynamic taint propagation. In HPCA, pages 196-206, 2008.
    • (2008) HPCA , pp. 196-206
    • Venkataramani, G.1    Doudalis, I.2    Solihin, Y.3    Prvulovic, M.4
  • 51
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • January
    • D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. J. Comput. Secur., 4:167-187, January 1996.
    • (1996) J. Comput. Secur. , vol.4 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 54
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • New York, NY, USA, ACM
    • Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In ISCA, pages 494-505, New York, NY, USA, 2007. ACM.
    • (2007) ISCA , pp. 494-505
    • Wang, Z.1    Lee, R.B.2
  • 57
    • 85094632142 scopus 로고    scopus 로고
    • Security distributed systems with information flow control
    • Apr.
    • N. Zeldovich, S. Boyd-Wickizer, and D.Mazieres. Security distributed systems with information flow control. In NSDI, pages 293-308, Apr. 2008.
    • (2008) NSDI , pp. 293-308
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazieres, D.3
  • 59
    • 77954997106 scopus 로고    scopus 로고
    • Hardware enforcement of application security policies using tagged memory
    • Dec.
    • N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies using tagged memory. In OSDI, Dec. 2008.
    • (2008) OSDI
    • Zeldovich, N.1    Kannan, H.2    Dalton, M.3    Kozyrakis, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.