-
1
-
-
0003502331
-
-
SRI, Tech. Rep.
-
John Rushby, "Noninterference, Transitivity, and Channel-Control Security Policies," SRI, Tech. Rep., 1992.
-
(1992)
Noninterference, Transitivity, and Channel-Control Security Policies
-
-
Rushby, J.1
-
3
-
-
84964512786
-
Security of SoC firmware load protocol
-
S. Krstic, J. Yang, D. W. Palmer, R. B. Osborne, and E. Talmor, "Security of SoC Firmware Load Protocol," in IEEE HOST, 2014.
-
(2014)
IEEE HOST
-
-
Krstic, S.1
Yang, J.2
Palmer, D.W.3
Osborne, R.B.4
Talmor, E.5
-
5
-
-
84944121354
-
IIPS: Infrastructure IP for secure soc design
-
X. Wang, Y. Zheng, A. Basak, and S. Bhunia, "IIPS: Infrastructure IP for Secure SoC Design," IEEE Transaction on Computers, 2014.
-
(2014)
IEEE Transaction on Computers
-
-
Wang, X.1
Zheng, Y.2
Basak, A.3
Bhunia, S.4
-
6
-
-
84964526045
-
Discussion topic: What is the old security paradigm
-
S. J. Greenwald, "Discussion Topic: What is the Old Security Paradigm," in Workshop on New Security Paradigms, 1998, pp. 107-118.
-
(1998)
Workshop on New Security Paradigms
, pp. 107-118
-
-
Greenwald, S.J.1
-
7
-
-
84984889445
-
ConXsense: Automated context classification for context-aware access control
-
M. Miettinen, S. Heuser, W. Kronz, A. Sadeghi, and N. Ashokan, "ConXsense: automated context classification for context-aware access control," in ASIACCS, 2014, pp. 293-304.
-
(2014)
ASIACCS
, pp. 293-304
-
-
Miettinen, M.1
Heuser, S.2
Kronz, W.3
Sadeghi, A.4
Ashokan, N.5
-
8
-
-
84866302360
-
CRePE: A system for enforcing Fine-grained Context-related Policies on Android
-
M. Conti, B. Crispo, F. Fernandes, and Y. Zhauniarovich, "CRePE: A system for enforcing Fine-grained Context-related Policies on Android," IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1426-1438, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.5
, pp. 1426-1438
-
-
Conti, M.1
Crispo, B.2
Fernandes, F.3
Zhauniarovich, Y.4
-
9
-
-
2342620647
-
Enabling context-aware and privacy-conscious user data sharing
-
R. Hull, B. Kumar, P. Patel-Schneider, A. Sahuguet, S. Varadarajan, and A. Vyas, "Enabling Context-aware and Privacy-conscious User Data Sharing," in 2004 IEEE International Conference on Mobile Data Management, 2004, pp. 187-198.
-
(2004)
2004 IEEE International Conference on Mobile Data Management
, pp. 187-198
-
-
Hull, R.1
Kumar, B.2
Patel-Schneider, P.3
Sahuguet, A.4
Varadarajan, S.5
Vyas, A.6
-
11
-
-
33745806932
-
A logic for information flow in object-oriented programs
-
ACM Press, Jan.
-
T. Amtoft, S. Bandhakavi, and A. Banerjee, "A Logic for Information Flow in Object-Oriented Programs," in Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2006). ACM Press, Jan. 2006, pp. 91-102.
-
(2006)
Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2006)
, pp. 91-102
-
-
Amtoft, T.1
Bandhakavi, S.2
Banerjee, A.3
-
12
-
-
0023558367
-
Recognizing safety and liveness
-
B. Alper and F. B. Schneider, "Recognizing Safety and Liveness," Distributed Computing, vol. 2, no. 3, pp. 117-126, 1987.
-
(1987)
Distributed Computing
, vol.2
, Issue.3
, pp. 117-126
-
-
Alper, B.1
Schneider, F.B.2
-
13
-
-
36048930400
-
Fixing races for fun and profit: How to abuse atime
-
N. Borisov, R. Johnson, N. Sastry, and D. Wagner, "Fixing Races for Fun and Profit: How to Abuse Atime," in Proceedings of the 14th USENIX Security Symposium, 2005, pp. 303-314.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
, pp. 303-314
-
-
Borisov, N.1
Johnson, R.2
Sastry, N.3
Wagner, D.4
-
14
-
-
84964431881
-
-
"www. opencores. com. "
-
-
-
-
16
-
-
79952530026
-
MERO: A statistical approach for hardware trojan detection
-
R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, "MERO: A Statistical Approach for Hardware Trojan Detection," in Workshop on Cryptographic Hardware and Embedded Systems, 2009.
-
(2009)
Workshop on Cryptographic Hardware and Embedded Systems
-
-
Chakraborty, R.S.1
Wolff, F.2
Paul, S.3
Papachristou, C.4
Bhunia, S.5
-
17
-
-
84896491283
-
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
-
U. Guin, D. DiMase, and M. Tehranipoor, "Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead," Journal of Electronic Testing, vol. 30, no. 1, pp. 25-40, 2014.
-
(2014)
Journal of Electronic Testing
, vol.30
, Issue.1
, pp. 25-40
-
-
Guin, U.1
DiMase, D.2
Tehranipoor, M.3
-
18
-
-
0036443181
-
Embedded memory test and repair: Infrastructure IP for SOC yield
-
Y. Zorian, "Embedded memory test and repair: Infrastructure IP for SOC yield," in International Test Conference, 2002, pp. 340-349.
-
(2002)
International Test Conference
, pp. 340-349
-
-
Zorian, Y.1
|