메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 20-37

CHERI: A hybrid capability-system architecture for scalable software compartmentalization

Author keywords

capability system; CHERI processor; computer architecture; memory protection; object capabilities; software compartmentalization

Indexed keywords

APPLICATION PROGRAMS; COMPUTER ARCHITECTURE; MEMORY MANAGEMENT UNITS; OPEN SOURCE SOFTWARE; OPEN SYSTEMS; PHYSICAL ADDRESSES; PROGRAM COMPILERS;

EID: 84941001078     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.9     Document Type: Conference Paper
Times cited : (210)

References (59)
  • 3
    • 51849104627 scopus 로고    scopus 로고
    • TrustZone: Integrated hardware and software security
    • ALVES, T., AND FELTON, D. TrustZone: Integrated hardware and software security. Information Quarterly 3, 4 (2004).
    • (2004) Information Quarterly , vol.3 , pp. 4
    • Alves, T.1    Felton, D.2
  • 4
    • 0004200684 scopus 로고
    • Tech. Rep. ESD-TR-73-51, U.S. Air Force Electronic Systems Division, October (Two volumes)
    • ANDERSON, J. Computer security technology planning study. Tech. Rep. ESD-TR-73-51, U.S. Air Force Electronic Systems Division, October 1972. (Two volumes).
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.1
  • 9
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Bedford, Massachusetts, June 1975. Also available from USAF Electronic Systems Division, Bedford, Massachusetts, as ESD-TR-76-372, April
    • BIBA, K. Integrity considerations for secure computer systems. Tech. Rep. MTR 3153, The Mitre Corporation, Bedford, Massachusetts, June 1975. Also available from USAF Electronic Systems Division, Bedford, Massachusetts, as ESD-TR-76-372, April 1977.
    • (1977) Tech. Rep. MTR 3153, the Mitre Corporation
    • Biba, K.1
  • 13
    • 84976708388 scopus 로고
    • Hardware support for fast capability-based addressing
    • Nov.
    • CARTER, N. P., KECKLER, S. W., AND DALLY, W. J. Hardware support for fast capability-based addressing. SIGPLAN Not. 29, 11 (Nov. 1994), 319-327.
    • (1994) SIGPLAN Not. , vol.29 , Issue.11 , pp. 319-327
    • Carter, N.P.1    Keckler, S.W.2    Dally, W.J.3
  • 17
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • DENNIS, J. B., AND VAN HORN, E. C. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (1966), 143-155.
    • (1966) Commun. ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    Van Horn, C.E.2
  • 18
    • 77957771407 scopus 로고    scopus 로고
    • Hardbound: Architectural support for spatial safety of the C programming language
    • Mar.
    • DEVIETTI, J., BLUNDELL, C., MARTIN, M. M. K., AND ZDANCEWIC, S. Hardbound: architectural support for spatial safety of the C programming language. SIGARCH Comput. Archit. News 36, 1 (Mar. 2008), 103-114.
    • (2008) SIGARCH Comput. Archit. News , vol.36 , Issue.1 , pp. 103-114
    • Devietti, J.1    Blundell, C.2    Martin, M.M.K.3    Zdancewic, S.4
  • 21
    • 84939193910 scopus 로고    scopus 로고
    • INTEL PLC. July
    • INTEL PLC. Introduction to Intel memory protection extensions. http://software.intel.com/en-us/articles/introduction-to-intel-memory-protection-extensions, July 2013.
    • (2013) Introduction to Intel Memory Protection Extensions
  • 26
    • 84948971509 scopus 로고    scopus 로고
    • Multics security evaluation: Vulnerability analysis
    • (Las Vegas, Nevada, December 2002). Originally available as U.S. Air Force report ESD-TR-74-193 Hanscomb Air Force Base, Massachusetts
    • KARGER, P., AND SCHELL, R. Multics security evaluation: Vulnerability analysis. In Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Classic Papers section (Las Vegas, Nevada, December 2002). Originally available as U.S. Air Force report ESD-TR-74-193, Vol. II, Hanscomb Air Force Base, Massachusetts.
    • Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Classic Papers Section , vol.2
    • Karger, P.1    Schell, R.2
  • 29
    • 84889021222 scopus 로고    scopus 로고
    • Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security
    • November
    • KWON, A., DHAWAN, U., SMITH, J. M., KNIGHT, JR., T. F., AND DE-HON, A. Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security. In 20th ACM Conference on Computer and Communications Security (November 2013).
    • (2013) 20th ACM Conference on Computer and Communications Security
    • Kwon, A.1    Dhawan, U.2    Smith, J.M.3    Knight, Jr.T.F.4    De-Hon, A.5
  • 39
    • 0036040304 scopus 로고    scopus 로고
    • CCured: Type-safe retrofitting of legacy code
    • NECULA, G. C., MCPEAK, S., AND WEIMER, W. CCured: Type-safe retrofitting of legacy code. ACM SIGPLAN Notices 37, 1 (2002), 128-139.
    • (2002) ACM SIGPLAN Notices , vol.37 , Issue.1 , pp. 128-139
    • Necula, G.C.1    McPeak, S.2    Weimer, W.3
  • 43
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in Multics
    • July
    • SALTZER, J. Protection and the control of information sharing in Multics. Commun. ACM 17, 7 (July 1974), 388-402.
    • (1974) Commun. ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.1
  • 44
    • 0015315880 scopus 로고
    • A hardware architecture for implementing protection rings
    • March
    • SCHROEDER, M., AND SALTZER, J. A hardware architecture for implementing protection rings. Commun. ACM 15, 3 (March 1972).
    • (1972) Commun. ACM , vol.15 , pp. 3
    • Schroeder, M.1    Saltzer, J.2
  • 52
    • 84873650573 scopus 로고    scopus 로고
    • A decade of OS access-control extensibility
    • Feb.
    • WAT S O N, R. N. M. A decade of OS access-control extensibility. Commun. ACM 56, 2 (Feb. 2013).
    • (2013) Commun. ACM , vol.56 , pp. 2
    • Wat, S.O.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.