-
2
-
-
84885699150
-
Tsmc 90nm core library - Tcbn90ghp
-
Mar.
-
Tsmc 90nm core library - tcbn90ghp. In Application Note - Revision 1.2, Mar. 2006.
-
(2006)
Application Note - Revision 1.2
-
-
-
6
-
-
52649112833
-
From speculation to security: Practical and efficient information flow tracking using speculative hardware
-
June
-
H. Chen, X. Wu, L. Yuan, B. Z. P. Yew, and F. T.Chong. From speculation to security: Practical and efficient information flow tracking using speculative hardware. In ISCA, June 2008.
-
(2008)
ISCA
-
-
Chen, H.1
Wu, X.2
Yuan, L.3
Yew, B.Z.P.4
Chong, F.T.5
-
7
-
-
52649155221
-
Flexible hardware acceleration for instruction-grain program monitoring
-
June
-
S. Chen, M. Kozuch, T. Strigkos, B. Falsafi, P. B.Gibbons, T. C.Mowry, V. Ramachandran, O. Ruwase, M. Ryan, and E. Vlachos. Flexible hardware acceleration for instruction-grain program monitoring. In ISCA, June 2008.
-
(2008)
ISCA
-
-
Chen, S.1
Kozuch, M.2
Strigkos, T.3
Falsafi, B.4
Gibbons, P.B.5
Mowry, T.C.6
Ramachandran, V.7
Ruwase, O.8
Ryan, M.9
Vlachos, E.10
-
8
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. of Usenix Security Symp., 1998.
-
Proc. of Usenix Security Symp., 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
9
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
June
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In ISCA, June 2007.
-
(2007)
ISCA
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
11
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct.
-
G. E.Suh, J. W.Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, Oct. 2004.
-
(2004)
ASPLOS
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
12
-
-
85180406262
-
Ostia: A delegating architecture for secure system call interposition
-
Feb.
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In NDSS, Feb. 2004.
-
(2004)
NDSS
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
13
-
-
0031701347
-
The slam calculus: Programming with secrecy and integrity
-
N. Heintze and J. Riecke. The slam calculus: Programming with secrecy and integrity. In POPL, 1998.
-
(1998)
POPL
-
-
Heintze, N.1
Riecke, J.2
-
14
-
-
33748096602
-
System call monitoring using authenticated system calls
-
T. Jim and M. Rajagopalan. System call monitoring using authenticated system calls. In TDSC, 2006.
-
(2006)
TDSC
-
-
Jim, T.1
Rajagopalan, M.2
-
15
-
-
70449976325
-
Decoupling dynamic information flow tracking with a dedicated coprocessor
-
June
-
H. Kannan, M. Dalton, and C. Kozyrakis. Decoupling dynamic information flow tracking with a dedicated coprocessor. In DSN, June 2009.
-
(2009)
DSN
-
-
Kannan, H.1
Dalton, M.2
Kozyrakis, C.3
-
16
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
G. Kc, A. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Kc, G.1
Keromytis, A.2
Prevelakis, V.3
-
17
-
-
0038524497
-
-
Jan. Available online at
-
M. Conover and w00w00 Security Team. w00w00 on heap overflows, Jan. 1999. Available online at http: //www.w00w00.org/files/articles/heaptut.txt.
-
(1999)
W00w00 on Heap Overflows
-
-
Conover, M.1
-
18
-
-
80052544236
-
M-sim
-
version 3.0, Available online at
-
M-sim version 3.0, code and documentation, 2005. Available online at:http://www.cs.binghamton.edu/~msim.
-
(2005)
Code and Documentation
-
-
-
19
-
-
0032646625
-
Jflow: Practical mostly static information flow control
-
A. Myers. Jflow: Practical mostly static information flow control. In POPL, 1999.
-
(1999)
POPL
-
-
Myers, A.1
-
20
-
-
0001048139
-
Proteccting provacy using decentralized lebel model
-
A. Myers and B. Liskov. Proteccting provacy using decentralized lebel model. In ACM TOSEM, (4), pp.410-422, 2000.
-
(2000)
ACM TOSEM
, Issue.4
, pp. 410-422
-
-
Myers, A.1
Liskov, B.2
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb.
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
23
-
-
77957797161
-
Parallelizing security checks on commodity hardware
-
E. Nightingale, D. Peek, and P. Chen. Parallelizing security checks on commodity hardware. In ASPLOS, 2008.
-
(2008)
ASPLOS
-
-
Nightingale, E.1
Peek, D.2
Chen, P.3
-
24
-
-
0030676681
-
Complexity effective superscalar processors
-
June
-
S. Palacharla, N. Jouppi, and J. E. Smith. Complexity effective superscalar processors. In ISCA, June 1997.
-
(1997)
ISCA
-
-
Palacharla, S.1
Jouppi, N.2
Smith, J.E.3
-
25
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
Dec.
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, Dec. 2006.
-
(2006)
MICRO
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
26
-
-
80052524118
-
Power 7 multicore processor design
-
Dec.
-
B. Sinharoy. Power 7 multicore processor design. In Keynote talk at MICRO, Dec. 2009.
-
(2009)
Keynote Talk at MICRO
-
-
Sinharoy, B.1
-
27
-
-
78149242271
-
Spec cpu2006 benchmark tools
-
C. D. Spradling. Spec cpu2006 benchmark tools. SIGARCH Comput. Archit. News, 35(1):130-134, 2007.
-
(2007)
SIGARCH Comput. Archit. News
, vol.35
, Issue.1
, pp. 130-134
-
-
Spradling, C.D.1
-
28
-
-
80052536663
-
-
Available online at
-
Us-cert, 2009. Available online at: http://www.us-cert.gov/.
-
(2009)
-
-
-
29
-
-
77949699943
-
Dynamic information flow tracking on multicores
-
Feb.
-
H. K. V. Nagarajan, Y. Wu, and R. Gupta. Dynamic information flow tracking on multicores. In INTERACT, Feb. 2008.
-
(2008)
INTERACT
-
-
Nagarajan, H.K.V.1
Wu, Y.2
Gupta, R.3
-
30
-
-
57749197593
-
FlexiTaint: A programmable accelerator for dynamic taint propagation
-
G. Venkataramani, I. Doudalis, and Y. Solihin. FlexiTaint: A programmable accelerator for dynamic taint propagation. In HPCA, 2008.
-
(2008)
HPCA
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
-
31
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, E. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proc. USENIX Security Symp., Aug. 2006.
-
Proc. USENIX Security Symp., Aug. 2006
-
-
Xu, W.1
Bhatkar, E.2
Sekar, R.3
|