메뉴 건너뛰기




Volumn , Issue , 2011, Pages

SIFT: A low-overhead dynamic information flow tracking architecture for SMT processors

Author keywords

dynamic information flow tracking; microarchitecture; security; simultaneous multithreading

Indexed keywords

AREA OVERHEAD; BASE DESIGN; BUFFER OVERFLOWS; CHIP MANUFACTURERS; CODE INJECTION ATTACKS; DYNAMIC INFORMATION FLOW TRACKING; HARDWARE IMPLEMENTATIONS; MICRO ARCHITECTURES; PERFORMANCE PENALTIES; PREFETCHING; SECURITY; SHADOW MEMORIES; SIMULTANEOUS MULTI-THREADING; SOFTWARE-BASED;

EID: 80052525471     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2016604.2016650     Document Type: Conference Paper
Times cited : (23)

References (31)
  • 2
    • 84885699150 scopus 로고    scopus 로고
    • Tsmc 90nm core library - Tcbn90ghp
    • Mar.
    • Tsmc 90nm core library - tcbn90ghp. In Application Note - Revision 1.2, Mar. 2006.
    • (2006) Application Note - Revision 1.2
  • 6
    • 52649112833 scopus 로고    scopus 로고
    • From speculation to security: Practical and efficient information flow tracking using speculative hardware
    • June
    • H. Chen, X. Wu, L. Yuan, B. Z. P. Yew, and F. T.Chong. From speculation to security: Practical and efficient information flow tracking using speculative hardware. In ISCA, June 2008.
    • (2008) ISCA
    • Chen, H.1    Wu, X.2    Yuan, L.3    Yew, B.Z.P.4    Chong, F.T.5
  • 9
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • June
    • M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In ISCA, June 2007.
    • (2007) ISCA
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 11
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Oct.
    • G. E.Suh, J. W.Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, Oct. 2004.
    • (2004) ASPLOS
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 12
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A delegating architecture for secure system call interposition
    • Feb.
    • T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In NDSS, Feb. 2004.
    • (2004) NDSS
    • Garfinkel, T.1    Pfaff, B.2    Rosenblum, M.3
  • 13
    • 0031701347 scopus 로고    scopus 로고
    • The slam calculus: Programming with secrecy and integrity
    • N. Heintze and J. Riecke. The slam calculus: Programming with secrecy and integrity. In POPL, 1998.
    • (1998) POPL
    • Heintze, N.1    Riecke, J.2
  • 14
    • 33748096602 scopus 로고    scopus 로고
    • System call monitoring using authenticated system calls
    • T. Jim and M. Rajagopalan. System call monitoring using authenticated system calls. In TDSC, 2006.
    • (2006) TDSC
    • Jim, T.1    Rajagopalan, M.2
  • 15
    • 70449976325 scopus 로고    scopus 로고
    • Decoupling dynamic information flow tracking with a dedicated coprocessor
    • June
    • H. Kannan, M. Dalton, and C. Kozyrakis. Decoupling dynamic information flow tracking with a dedicated coprocessor. In DSN, June 2009.
    • (2009) DSN
    • Kannan, H.1    Dalton, M.2    Kozyrakis, C.3
  • 16
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • G. Kc, A. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Kc, G.1    Keromytis, A.2    Prevelakis, V.3
  • 17
    • 0038524497 scopus 로고    scopus 로고
    • Jan. Available online at
    • M. Conover and w00w00 Security Team. w00w00 on heap overflows, Jan. 1999. Available online at http: //www.w00w00.org/files/articles/heaptut.txt.
    • (1999) W00w00 on Heap Overflows
    • Conover, M.1
  • 18
    • 80052544236 scopus 로고    scopus 로고
    • M-sim
    • version 3.0, Available online at
    • M-sim version 3.0, code and documentation, 2005. Available online at:http://www.cs.binghamton.edu/~msim.
    • (2005) Code and Documentation
  • 19
    • 0032646625 scopus 로고    scopus 로고
    • Jflow: Practical mostly static information flow control
    • A. Myers. Jflow: Practical mostly static information flow control. In POPL, 1999.
    • (1999) POPL
    • Myers, A.1
  • 20
    • 0001048139 scopus 로고    scopus 로고
    • Proteccting provacy using decentralized lebel model
    • A. Myers and B. Liskov. Proteccting provacy using decentralized lebel model. In ACM TOSEM, (4), pp.410-422, 2000.
    • (2000) ACM TOSEM , Issue.4 , pp. 410-422
    • Myers, A.1    Liskov, B.2
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Feb.
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 23
    • 77957797161 scopus 로고    scopus 로고
    • Parallelizing security checks on commodity hardware
    • E. Nightingale, D. Peek, and P. Chen. Parallelizing security checks on commodity hardware. In ASPLOS, 2008.
    • (2008) ASPLOS
    • Nightingale, E.1    Peek, D.2    Chen, P.3
  • 24
    • 0030676681 scopus 로고    scopus 로고
    • Complexity effective superscalar processors
    • June
    • S. Palacharla, N. Jouppi, and J. E. Smith. Complexity effective superscalar processors. In ISCA, June 1997.
    • (1997) ISCA
    • Palacharla, S.1    Jouppi, N.2    Smith, J.E.3
  • 25
    • 40349087553 scopus 로고    scopus 로고
    • Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • Dec.
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, Dec. 2006.
    • (2006) MICRO
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.4    Zhou, Y.5    Wu, Y.6
  • 26
    • 80052524118 scopus 로고    scopus 로고
    • Power 7 multicore processor design
    • Dec.
    • B. Sinharoy. Power 7 multicore processor design. In Keynote talk at MICRO, Dec. 2009.
    • (2009) Keynote Talk at MICRO
    • Sinharoy, B.1
  • 27
    • 78149242271 scopus 로고    scopus 로고
    • Spec cpu2006 benchmark tools
    • C. D. Spradling. Spec cpu2006 benchmark tools. SIGARCH Comput. Archit. News, 35(1):130-134, 2007.
    • (2007) SIGARCH Comput. Archit. News , vol.35 , Issue.1 , pp. 130-134
    • Spradling, C.D.1
  • 28
    • 80052536663 scopus 로고    scopus 로고
    • Available online at
    • Us-cert, 2009. Available online at: http://www.us-cert.gov/.
    • (2009)
  • 29
    • 77949699943 scopus 로고    scopus 로고
    • Dynamic information flow tracking on multicores
    • Feb.
    • H. K. V. Nagarajan, Y. Wu, and R. Gupta. Dynamic information flow tracking on multicores. In INTERACT, Feb. 2008.
    • (2008) INTERACT
    • Nagarajan, H.K.V.1    Wu, Y.2    Gupta, R.3
  • 30
    • 57749197593 scopus 로고    scopus 로고
    • FlexiTaint: A programmable accelerator for dynamic taint propagation
    • G. Venkataramani, I. Doudalis, and Y. Solihin. FlexiTaint: A programmable accelerator for dynamic taint propagation. In HPCA, 2008.
    • (2008) HPCA
    • Venkataramani, G.1    Doudalis, I.2    Solihin, Y.3
  • 31
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, E. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proc. USENIX Security Symp., Aug. 2006.
    • Proc. USENIX Security Symp., Aug. 2006
    • Xu, W.1    Bhatkar, E.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.