-
1
-
-
84897745388
-
-
Synopsys University program, Synopsys Inc
-
90nm generic CMOS library, Synopsys University program, Synopsys Inc.
-
90nm Generic CMOS Library
-
-
-
2
-
-
84894591387
-
-
SPEC CPU 2006. http://www.spec.org/cpu2006/.
-
(2006)
SPEC CPU
-
-
-
3
-
-
80052534641
-
-
What does CC EAL6+ mean? http://www.oklabs.com/blog/entry/what-does-cc- eal6-mean/.
-
What Does CC EAL6+ Mean?
-
-
-
5
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using IC fingerprinting. Security and Privacy, 2007.
-
(2007)
Security and Privacy
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
6
-
-
51849104627
-
Trustzone: Integrated hardware and software security
-
T. Alves. Trustzone: Integrated hardware and software security. ARM white paper, 3(4), 2004.
-
(2004)
ARM White Paper
, vol.3
, Issue.4
-
-
Alves, T.1
-
8
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
New York, NY, USA, ACM
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A flexible information flow architecture for software security. In Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA '07, pages 482-493, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA '07
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
9
-
-
84864833517
-
Side-channel vulnerability factor: A metric for measuring information leakage
-
Washington, DC, USA, IEEE Computer Society
-
J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan. Side-channel vulnerability factor: A metric for measuring information leakage. In Proceedings of the 39th Annual Inter-national Symposium on Computer Architecture, ISCA '12, pages 106-117, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 39th Annual Inter-national Symposium on Computer Architecture, ISCA '12
, pp. 106-117
-
-
Demme, J.1
Martin, R.2
Waksman, A.3
Sethumadhavan, S.4
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
84962779213
-
Mibench: A free, commercially representative embedded benchmark suite
-
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown. Mibench: A free, commercially representative embedded benchmark suite. In WWC, 2001.
-
(2001)
WWC
-
-
Guthaus, M.R.1
Ringenberg, J.S.2
Ernst, D.3
Austin, T.M.4
Mudge, T.5
Brown, R.B.6
-
13
-
-
85084095841
-
Designing and implementing malicious hardware
-
Berkeley, CA, USA,. USENIX Association
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou. Designing and implementing malicious hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET'08, pages 5:1-5:8, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET'08
, pp. 51-58
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
14
-
-
72249120603
-
SeL4: Formal verification of an os kernel
-
New York, NY, USA,. ACM
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an os kernel. In Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP '09, pages 207-220, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP '09
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
16
-
-
70449657350
-
Noninterference for a practical difcbased operating system
-
M. Krohn and E. Tromer. Noninterference for a practical difcbased operating system. In Security and Privacy, 2009.
-
(2009)
Security and Privacy
-
-
Krohn, M.1
Tromer, E.2
-
17
-
-
57749192483
-
Information flow control for standard os abstractions
-
New York, NY, USA,. ACM
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard os abstractions. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 321-334, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
18
-
-
79959876833
-
Caisson: A hardware description language for secure information flow
-
New York, NY, USA,. ACM
-
X. Li, M. Tiwari, J. K. Oberg, V. Kashyap, F. T. Chong, T. Sherwood, and B. Hardekopf. Caisson: A hardware description language for secure information flow. In Proceed-ings of the 32Nd ACMSIGPLAN Conference on Programming Language Design and Implementation, PLDI '11, pages 109-120, New York, NY, USA, 2011. ACM.
-
(2011)
Proceed-ings of the 32Nd ACMSIGPLAN Conference on Programming Language Design and Implementation, PLDI '11
, pp. 109-120
-
-
Li, X.1
Tiwari, M.2
Oberg, J.K.3
Kashyap, V.4
Chong, F.T.5
Sherwood, T.6
Hardekopf, B.7
-
19
-
-
84864837138
-
Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
-
Washington, DC, USA, IEEE Computer Society
-
R. Martin, J. Demme, and S. Sethumadhavan. Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. In Proceedings of the 39th Annual International Symposium on Computer Architec-ture, ISCA '12, pages 118-129,Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 39th Annual International Symposium on Computer Architec-ture, ISCA '12
, pp. 118-129
-
-
Martin, R.1
Demme, J.2
Sethumadhavan, S.3
-
21
-
-
33646177208
-
Enforcing robust declassification and qualified robustness
-
Apr
-
A. C. Myers, A. Sabelfeld, and S. Zdancewic. Enforcing robust declassification and qualified robustness. J. Comput. Secur., 14(2):157-196, Apr. 2006.
-
(2006)
J. Comput. Secur.
, vol.14
, Issue.2
, pp. 157-196
-
-
Myers, A.C.1
Sabelfeld, A.2
Zdancewic, S.3
-
22
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
B. Parno, J. R. Lorch, J. R. Douceur, J. Mickens, and J. M. McCune. Memoir: Practical state continuity for protected modules. In Proceedings of the IEEE Symposium on Security and Privacy, 2011.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
23
-
-
70350699446
-
Cache missing for fun and profit
-
C. Percival. Cache missing for fun and profit. In Proc. of BSDCan, 2005.
-
(2005)
Proc. of BSDCan
-
-
Percival, C.1
-
24
-
-
70450227330
-
Laminar: Practical fine-grained decentralized information flow control
-
New York, NY, USA,. ACM
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical fine-grained decentralized information flow control. In Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '09, pages 63-74, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '09
, pp. 63-74
-
-
Roy, I.1
Porter, D.E.2
Bond, M.D.3
McKinley, K.S.4
Witchel, E.5
-
28
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
New York, NY, USA, ACM
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the 11th International Conference on Archi-tectural Support for Programming Languages and Operating Systems, ASPLOS XI, pages 85-96, New York, NY, USA,2004. ACM.
-
(2004)
Proceedings of the 11th International Conference on Archi-tectural Support for Programming Languages and Operating Systems, ASPLOS XI
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
29
-
-
76749092676
-
Execution leases: A hardware-supported mechanism for enforcing strong non-interference
-
New York, NY, USA,. ACM
-
M. Tiwari, X. Li, H. M. G. Wassel, F. T. Chong, and T. Sherwood. Execution leases: A hardware-supported mechanism for enforcing strong non-interference. In Proceedings of the 42Nd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 42, pages 493-504, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 42Nd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 42
, pp. 493-504
-
-
Tiwari, M.1
Li, X.2
Wassel, H.M.G.3
Chong, F.T.4
Sherwood, T.5
-
30
-
-
80052533055
-
Crafting a usable microkernel, processor, and i/o system with strict and provable information flow security
-
New York, NY, USA, ACM
-
M. Tiwari, J. K. Oberg, X. Li, J. Valamehr, T. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. Crafting a usable microkernel, processor, and i/o system with strict and provable information flow security. In Proceedings of the 38th Annual International Symposium on Computer Architecture, ISCA 11, pages 189-200, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 38th Annual International Symposium on Computer Architecture, ISCA 11
, pp. 189-200
-
-
Tiwari, M.1
Oberg, J.K.2
Li, X.3
Valamehr, J.4
Levin, T.5
Hardekopf, B.6
Kastner, R.7
Chong, F.T.8
Sherwood, T.9
-
31
-
-
67650085261
-
Complete information flow tracking from the gates up
-
New York, NY, USA, ACM
-
M. Tiwari, H. M. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood. Complete information flow tracking from the gates up. In Proceedings of the 14th International Conference on Architectural Support for ProgrammingLanguages and Operating Systems, ASPLOS XIV, pages 109-120, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 14th International Conference on Architectural Support for ProgrammingLanguages and Operating Systems, ASPLOS XIV
, pp. 109-120
-
-
Tiwari, M.1
Wassel, H.M.2
Mazloom, B.3
Mysore, S.4
Chong, F.T.5
Sherwood, T.6
-
32
-
-
84864858804
-
Inspection resistant memory: Architectural support for security from physical examination
-
Washington, DC, USA, IEEE Computer Society
-
J. Valamehr, M. Chase, S. Kamara, A. Putnam, D. Shumow, V. Vaikuntanathan, and T. Sherwood. Inspection resistant memory: Architectural support for security from physical examination. In Proceedings of the 39th Annual International Symposium on Computer Architecture, ISCA '12, pages 130-141, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 39th Annual International Symposium on Computer Architecture, ISCA '12
, pp. 130-141
-
-
Valamehr, J.1
Chase, M.2
Kamara, S.3
Putnam, A.4
Shumow, D.5
Vaikuntanathan, V.6
Sherwood, T.7
-
33
-
-
84871997733
-
CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms
-
A. Vasudevan, J. McCune, J. Newsome, A. Perrig, and L. van Doorn. CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012.
-
(2012)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Vasudevan, A.1
McCune, J.2
Newsome, J.3
Perrig, A.4
Van Doorn, L.5
-
37
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
New York, NY, USA, ACM
-
Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA '07, pages 494-505, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA '07
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
38
-
-
66749109266
-
A novel cache architecture with enhanced performance and security
-
Washington, DC, USA,. IEEE Computer Society
-
Z. Wang and R. B. Lee. A novel cache architecture with enhanced performance and security. In Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 41, pages 83-93, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 41
, pp. 83-93
-
-
Wang, Z.1
Lee, R.B.2
-
39
-
-
84888352157
-
Making information flow explicit in HiStar
-
Berkeley, CA, USA,. USENIX Association
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres. Making information flow explicit in HiStar. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation-Volume 7, OSDI '06, pages 19-19, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation-7, OSDI '06
, pp. 19-19
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazieres, D.4
-
40
-
-
84866417462
-
Language-based control and mitigation of timing channels
-
New York, NY, USA,. ACM
-
D. Zhang, A. Askarov, and A. C. Myers. Language-based control and mitigation of timing channels. In Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, pages 99-110, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12
, pp. 99-110
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
|