-
1
-
-
78751515214
-
On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible?
-
M. I. Al-Saleh and J. R. Crandall. On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible? In Proceedings of the Workshop on New Security Paradigms, pages 17-32, 2010.
-
(2010)
Proceedings of the Workshop on New Security Paradigms
, pp. 17-32
-
-
Al-Saleh, M.I.1
Crandall, J.R.2
-
2
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of USENIX Security Symposium, pages 15:1-15:16, 2007.
-
(2007)
Proceedings of USENIX Security Symposium
, pp. 151-1516
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
4
-
-
79959617325
-
Secureme: A hardware-software approach to full system security
-
S. Chhabra, B. Rogers, Y. Solihin, and M. Prvulovic. Secureme: a hardware-software approach to full system security. In Proceedings of the International Conference on Supercomputing, pages 108-119, 2011.
-
(2011)
Proceedings of the International Conference on Supercomputing
, pp. 108-119
-
-
Chhabra, S.1
Rogers, B.2
Solihin, Y.3
Prvulovic, M.4
-
5
-
-
85071952998
-
Mace: Model-inference-assisted concolic exploration for protocol and vulnerability discovery
-
C. Y. Cho, D. Babić, P. Poosankam, K. Z. Chen, E. X. Wu, and D. Song. Mace: model-inference-assisted concolic exploration for protocol and vulnerability discovery. In Proceedings of USENIX Security Symposium, pages 10-10, 2011.
-
(2011)
Proceedings of USENIX Security Symposium
, pp. 10-10
-
-
Cho, C.Y.1
Babić, D.2
Poosankam, P.3
Chen, K.Z.4
Wu, E.X.5
Song, D.6
-
6
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfa?, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of USENIX Security Symposium, pages 22-22, 2004.
-
(2004)
Proceedings of USENIX Security Symposium
, pp. 22-22
-
-
Chow, J.1
Pfa, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
10
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. In Proceedings of the ACM Symposium on Operating Systems Principles, pages 17-30, 2005.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
Vandebogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
11
-
-
84903607772
-
Dynamic spyware analysis
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In Proceedings of the USENIX Annual Technical Conference, pages 18:1-18:14, 2007.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
, pp. 181-1814
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
12
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: cold boot attacks on encryption keys. In Proceedings of USENIX Security Symposium, pages 45-60, 2008.
-
(2008)
Proceedings of USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
14
-
-
0025429331
-
Improving direct-mapped cache performance by the addition of a small fully-associative cache and prefetch buffers
-
N. P. Jouppi. Improving direct-mapped cache performance by the addition of a small fully-associative cache and prefetch buffers. In Proceedings of the ACM/IEEE International Symposium on Computer Architecture, pages 364-373, 1990.
-
(1990)
Proceedings of the ACM/IEEE International Symposium on Computer Architecture
, pp. 364-373
-
-
Jouppi, N.P.1
-
16
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the ACM/IEEE International Symposium on Computer Architecture, pages 2-13, 2005.
-
(2005)
Proceedings of the ACM/IEEE International Symposium on Computer Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
18
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proceedings of the IEEE Security and Privacy, pages 143-158, 2010.
-
(2010)
Proceedings of the IEEE Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
19
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. In Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems, pages 315-328, 2008.
-
(2008)
Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
22
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H.-s. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Proceedings of the IEEE/ACM International Symposium on Microarchitecture, pages 135-148, 2006.
-
(2006)
Proceedings of the IEEE/ACM International Symposium on Microarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
23
-
-
0037251378
-
Language-based information-flow security. Selected Areas in Communications
-
Jan.
-
A. Sabelfeld and A. C. Myers. Language-based information-flow security. Selected Areas in Communications, IEEE Journal on, 21(1):5-19, Jan. 2003.
-
(2003)
IEEE Journal on
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
24
-
-
34748842601
-
Reducing tcb complexity for security-sensitive applications: Three case studies
-
L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing tcb complexity for security-sensitive applications: three case studies. In Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems, pages 161-174, 2006.
-
(2006)
Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
25
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Keynote invited paper
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, N. James, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In Proceedings of the International Conference on Information Systems Security. Keynote invited paper., pages 1-25, 2008.
-
(2008)
Proceedings of the International Conference on Information Systems Security
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
James, N.8
Poosankam, P.9
Saxena, P.10
-
26
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, 2004.
-
(2004)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
27
-
-
67650085261
-
Complete information flow tracking from the gates up
-
M. Tiwari, H. M. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood. Complete information flow tracking from the gates up. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pages 109-120, 2009.
-
(2009)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 109-120
-
-
Tiwari, M.1
Wassel, H.M.2
Mazloom, B.3
Mysore, S.4
Chong, F.T.5
Sherwood, T.6
-
28
-
-
84870630391
-
-
Trusted Computing Group. Trusted Platform Module. https://www. trustedcomputinggroup.org/home.
-
Trusted Platform Module
-
-
-
29
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In Proceedings of the IEEE/ACM International Symposium on Microarchitecture, pages 243-254, 2004.
-
(2004)
Proceedings of the IEEE/ACM International Symposium on Microarchitecture
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
30
-
-
37049002830
-
Labels and event processes in the asbestos operating system
-
December
-
S. Vandebogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D. Mazières. Labels and event processes in the asbestos operating system. ACM Trans. Comput. Syst., 25, December 2007.
-
(2007)
ACM Trans. Comput. Syst.
, vol.25
-
-
Vandebogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazières, D.9
-
32
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the ACM Conference on Computer and Communications Security, pages 116-127, 2007.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
33
-
-
84888352157
-
Making information flow explicit in histar
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in histar. In Proceedings of the Symposium on Operating Systems Design and Implementation, pages 263-278, 2006.
-
(2006)
Proceedings of the Symposium on Operating Systems Design and Implementation
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|