메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Making programs forget: Enforcing lifetime for sensitive data

Author keywords

[No Author keywords available]

Indexed keywords

ALTERNATE APPROACHES; ON STATE; SENSITIVE DATAS; SYSTEM PROPERTY;

EID: 84979668035     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (13)
  • 1
    • 72249094336 scopus 로고    scopus 로고
    • ODR: Output-Deterministic Replay for Multicore Debugging
    • ALTEKAR, G., AND STOICA, I. ODR: Output-Deterministic Replay for Multicore Debugging. In Proc. SOSP (2009).
    • (2009) Proc. SOSP
    • ALTEKAR, G.1    STOICA, I.2
  • 2
    • 85030750455 scopus 로고    scopus 로고
    • Using Magpie for Request Extraction and Workload Modelling
    • BARHAM, P., DONNELLY, A., ISAACS, R., AND MORTIER, R. Using Magpie for Request Extraction and Workload Modelling. In Proc. OSDI (2004).
    • (2004) Proc. OSDI
    • BARHAM, P.1    DONNELLY, A.2    ISAACS, R.3    MORTIER, R.4
  • 3
    • 84870682965 scopus 로고    scopus 로고
    • Protecting Confidential Data on Personal Computers with Storage Capsules
    • E., AND
    • BORDERS, K., V, E., WEELE, E., LAU, B., AND PRAKASH, A. Protecting Confidential Data on Personal Computers with Storage Capsules. In Proc. Usenix Security (2009).
    • (2009) Proc. Usenix Security
    • BORDERS, K.1    WEELE, E.2    LAU, B.3    PRAKASH, A.4
  • 7
    • 84889030419 scopus 로고    scopus 로고
    • Shredding your garbage: reducing data lifetime through secure deallocation
    • CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM, M. Shredding your garbage: reducing data lifetime through secure deallocation. In Proc. USENIX Security (2005).
    • (2005) Proc. USENIX Security
    • CHOW, J.1    PFAFF, B.2    GARFINKEL, T.3    ROSENBLUM, M.4
  • 10
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • NEWSOME, J., AND SONG, D. Dynamic taint analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. NDSS (2005).
    • (2005) Proc. NDSS
    • NEWSOME, J.1    SONG, D.2
  • 11
    • 33947099428 scopus 로고    scopus 로고
    • File System Design with Assured Delete
    • PERLMAN, R. File System Design with Assured Delete. In Proc. SISW (2005).
    • (2005) Proc. SISW
    • PERLMAN, R.1
  • 13
    • 84991934426 scopus 로고    scopus 로고
    • TightLip: Keeping Applications From Spilling The Beans
    • YUMEREFENDI, A. R., MICKLE, B., AND COX, L. P. TightLip: Keeping Applications From Spilling The Beans. In Proc. NSDI (2007).
    • (2007) Proc. NSDI
    • YUMEREFENDI, A. R.1    MICKLE, B.2    COX, L. P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.