-
2
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Berlin, Heidelberg. Springer-Verlag
-
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. Termination-insensitive noninterference leaks more than just a bit. In Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security, ESORICS '08, pages 333-348, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security, ESORICS '08
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
4
-
-
33646392466
-
Preventing timing leaks through transactional branching instructions
-
May
-
Gilles Barthe, Tamara Rezk, and Martijn Warnier. Preventing timing leaks through transactional branching instructions. Electron. Notes Theor. Comput. Sci., 153(2):33-55, May 2006.
-
(2006)
Electron. Notes Theor. Comput. Sci
, vol.153
, Issue.2
, pp. 33-55
-
-
Barthe, G.1
Rezk, T.2
Warnier, M.3
-
6
-
-
84884993765
-
-
HMC Consortium
-
HMC Consortium. Hybrid memory cube. http://hybridmemorycube. org/.
-
Hybrid Memory Cube
-
-
-
7
-
-
70449623154
-
Practical mitigations for timing-based side-channel attacks on modern x86 processors
-
Washington, DC, USA. IEEE Computer Society
-
Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, and Bjorn De Sutter. Practical mitigations for timing-based side-channel attacks on modern x86 processors. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP '09, pages 45-60, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP '09
, pp. 45-60
-
-
Coppens, B.1
Verbauwhede, I.2
De Bosschere, K.3
De Sutter, B.4
-
11
-
-
78650606457
-
Privacy-preserving data-oblivious geometric algorithms for geographic data
-
David Eppstein, Michael T. Goodrich, and Roberto Tamassia. Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS, pages 13-22, 2010.
-
(2010)
GIS
, pp. 13-22
-
-
Eppstein, D.1
Goodrich, M.T.2
Tamassia, R.3
-
12
-
-
84869402047
-
A secure processor architecture for encrypted computation on untrusted programs
-
ACM
-
Christopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. A secure processor architecture for encrypted computation on untrusted programs. In Proceedings of the seventh ACM workshop on Scalable trusted computing, STC '12, pages 3-8. ACM, 2012.
-
(2012)
Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, STC '12
, pp. 3-8
-
-
Fletcher, C.W.1
Van Dijk, M.2
Devadas, S.3
-
13
-
-
33845512960
-
Flow-insensitive type qualifiers
-
November
-
Jeffrey S. Foster, Robert Johnson, John Kodumal, and Alex Aiken. Flow-Insensitive Type Qualifiers. ACM Transactions of Programming Languages and Systems (TOPLAS), 28(6):1035-1087, November 2006.
-
(2006)
ACM Transactions of Programming Languages and Systems (TOPLAS)
, vol.28
, Issue.6
, pp. 1035-1087
-
-
Foster, J.S.1
Johnson, R.2
Kodumal, J.3
Aiken, A.4
-
15
-
-
85041431588
-
Hails: Protecting data privacy in untrusted web applications
-
Berkeley, CA, USA. USENIX Association
-
Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, and Alejandro Russo. Hails: protecting data privacy in untrusted web applications. In Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation, OSDI'12, pages 47-60, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12
, pp. 47-60
-
-
Giffin, D.B.1
Levy, A.2
Stefan, D.3
Terei, D.4
Mazières, D.5
Mitchell, J.C.6
Russo, A.7
-
16
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In ACM Symposium on Theory of Computing (STOC), 1987.
-
(1987)
ACM Symposium on Theory of Computing (STOC)
-
-
Goldreich, O.1
-
17
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
20
-
-
84874155278
-
Data-oblivious graph drawing model and algorithms
-
abs/1209. 0756
-
Michael T. Goodrich, Olga Ohrimenko, and Roberto Tamassia. Data-oblivious graph drawing model and algorithms. CoRR, abs/1209. 0756, 2012.
-
(2012)
CoRR
-
-
Goodrich, M.T.1
Ohrimenko, O.2
Tamassia, R.3
-
21
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys. Commun.
-
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. Lest we remember: cold-boot attacks on encryption keys. Commun. ACM, 52(5):91-98, 2009.
-
(2009)
ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Alex Halderman, J.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
22
-
-
28044445125
-
Timing aware in-formation flow security for a javacard-like bytecode
-
December
-
Daniel Hedin and David Sands. Timing aware in-formation flow security for a javacard-like bytecode. Electron. Notes Theor. Comput. Sci., 141(1):163-182, December 2005.
-
(2005)
Electron. Notes Theor. Comput. Sci.
, vol.141
, Issue.1
, pp. 163-182
-
-
Hedin, D.1
Sands, D.2
-
23
-
-
84885942006
-
Cloud computing takes off, market set to boom as migration accelerates
-
Adam Holt, Keith Weiss, Katy Huberty, Ehud Gelblum, Simon Flannery, Sanjay Devgan, Atif Malik, Nathan Rozof, Adam Wood, Patrick Standaert, Francois Meunier, Jasmine Lu, Grace Chen, Bill Lu, Keon Han, Vipin Khare, and Masaharu Miyachi. Cloud computing takes off, market set to boom as migration accelerates. Morgan Stanley Blue Paper, http://www. morganstanley. com/views/perspectives/ cloud computing. pdf, 2011.
-
(2011)
Morgan Stanley Blue Paper
-
-
Holt, A.1
Weiss, K.2
Huberty, K.3
Gelblum, E.4
Flannery, S.5
Devgan, S.6
Malik, A.7
Rozof, N.8
Wood, A.9
Standaert, P.10
Meunier, F.11
Lu, J.12
Chen, G.13
Lu, B.14
Han, K.15
Khare, V.16
Miyachi, M.17
-
24
-
-
84885007548
-
-
Safety joins performance: Infineon introduces automotive multicore 32-bit microcontroller family aurix-tm to meet safety and powertrain requirements of upcoming vehicle generations
-
Safety joins performance: Infineon introduces automotive multicore 32-bit microcontroller family aurix-tm to meet safety and powertrain requirements of upcoming vehicle generations. http://www. infineon. com/cms/en/corporate/press/ news/ releases/2012/INFATV201205-040. html.
-
-
-
-
25
-
-
84885008496
-
-
Jif: Java + information flow
-
Jif: Java + information flow. http://www. cs. cornell. edu/ jif/.
-
-
-
-
29
-
-
84885932559
-
Practical, on-demand oblivious computation
-
Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, John Kubiatowicz, Krste Asanovic, Ch. Papamanthou, and Dawn Song. Practical, on-demand oblivious computation. Manuscript in submission, 2012.
-
(2012)
Manuscript in Submission
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Kubiatowicz, J.6
Asanovic, K.7
Papamanthou, Ch.8
Song, D.9
-
30
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, and Adrian Perrig. Trustvisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
31
-
-
70449632684
-
Clamp: Practical prevention of large-scale data leaks
-
May
-
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, and Adrian Perrig. Clamp: Practical prevention of large-scale data leaks. In Proceedings of the 2009 IEEE Symposium on Security and Privacy, May 2009.
-
(2009)
Proceedings of the 2009 IEEE Symposium on Security and Privacy
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
32
-
-
0348017041
-
Information flow inference for ml
-
January
-
François Pottier and Vincent Simonet. Information flow inference for ml. ACM Trans. Program. Lang. Syst., 25(1):117-158, January 2003.
-
(2003)
ACM Trans. Program. Lang. Syst.
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
33
-
-
47349124111
-
Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly
-
Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, and Yan Solihin. Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly. In Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 40, pages 183-196, 2007.
-
(2007)
Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 40
, pp. 183-196
-
-
Rogers, B.1
Chhabra, S.2
Prvulovic, M.3
Solihin, Y.4
-
35
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkeley, CA, USA. USENIX Association
-
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th conference on USENIX Security Symposium-Volume 13, SSYM'04, pages 16-16, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium-Volume 13, SSYM'04
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
36
-
-
82955173838
-
Oblivious RAM with O((logN)3) worstcase cost
-
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, and Mingfei Li. Oblivious RAM with O((logN)3) worstcase cost. In ASIACRYPT, pages 197-214, 2011.
-
(2011)
ASIACRYPT
, pp. 197-214
-
-
Shi, E.1
Hubert Chan, T.-H.2
Stefanov, E.3
Li, M.4
-
38
-
-
40349095134
-
Authentication control point and its implications for secure processor design
-
Washington, DC, USA. IEEE Computer Society
-
Weidong Shi and Hsien-Hsin S. Lee. Authentication control point and its implications for secure processor design. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 39, pages 103-112, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 39
, pp. 103-112
-
-
Shi, W.1
Lee, H.S.2
-
39
-
-
10444227999
-
Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems
-
Washington, DC, USA. IEEE Computer Society
-
Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, and Chenghuai Lu. Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems. In Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques, PACT '04, pages 123-134, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques, PACT '04
, pp. 123-134
-
-
Shi, W.1
Lee, H.S.2
Ghosh, M.3
Lu, C.4
-
40
-
-
27544453319
-
High efficiency counter mode security architecture via prediction and precomputation
-
Washington, DC, USA. IEEE Computer Society
-
Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, and Alexandra Boldyreva. High efficiency counter mode security architecture via prediction and precomputation. In Proceedings of the 32nd annual international symposium on Computer Architecture, ISCA '05, pages 14-24, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 32nd Annual International Symposium on Computer Architecture, ISCA '05
, pp. 14-24
-
-
Shi, W.1
Lee, H.S.2
Ghosh, M.3
Lu, C.4
Boldyreva, A.5
-
41
-
-
27244444861
-
-
Technical Report UCAM-CL-TR-536, University of Cambridge, Computer Laboratory, June
-
Sergei Skorobogatov. Low temperature data remanence in static RAM. Technical Report UCAM-CL-TR-536, University of Cambridge, Computer Laboratory, June 2002.
-
(2002)
Low Temperature Data Remanence in Static RAM
-
-
Skorobogatov, S.1
-
43
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
New York, NY, USA. ACM
-
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. Aegis: architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th annual international conference on Supercomputing, ICS '03, pages 160-171, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing, ICS '03
, pp. 160-171
-
-
Edward Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
44
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
November
-
David Lie Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, and Mark Horowitz. Architectural support for copy and tamper resistant software. SIGOPS Oper. Syst. Rev., 34(5):168-177, November 2000.
-
(2000)
SIGOPS Oper. Syst. Rev.
, vol.34
, Issue.5
, pp. 168-177
-
-
Lie Chandramohan Thekkath, D.1
Mitchell, M.2
Lincoln, P.3
Boneh, D.4
Mitchell, J.5
Horowitz, M.6
-
45
-
-
84869381921
-
Single round access privacy on outsourced storage
-
Peter Williams and Radu Sion. Single round access privacy on outsourced storage. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
46
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
New York, NY, USA. ACM
-
Peter Williams, Radu Sion, and Bogdan Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pages 139-148, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
47
-
-
84869453208
-
Privatefs: A parallel oblivious file system
-
New York, NY, USA. ACM
-
Peter Williams, Radu Sion, and Alin Tomescu. Privatefs: a parallel oblivious file system. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 977-988, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 977-988
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
-
48
-
-
80155195722
-
Making information flow explicit in histar
-
Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazières. Making information flow explicit in histar. Commun. ACM, 54(11):93-101, 2011.
-
(2011)
Commun. ACM
, vol.54
, Issue.11
, pp. 93-101
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
49
-
-
84866417462
-
Language-based control and mitigation of timing channels
-
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. Language-based control and mitigation of timing channels. In PLDI, pages 99-110, 2012.
-
(2012)
PLDI
, pp. 99-110
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
50
-
-
12844260675
-
Hide: An infrastructure for efficiently protecting information leakage on the address bus
-
October
-
Xiaotong Zhuang, Tao Zhang, and Santosh Pande. Hide: an infrastructure for efficiently protecting information leakage on the address bus. SIGARCH Comput. Archit. News, 32(5):72-84, October 2004.
-
(2004)
SIGARCH Comput. Archit. News
, vol.32
, Issue.5
, pp. 72-84
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
|