Architectural support for secure and survivable embedded software

作者: Jesse Sathre

DOI: 10.31274/RTD-180813-16077

关键词:

摘要:

参考文章(49)
G. Edward Suh, Charles W. O'Donnell, Ishan Sachdev, Srinivas Devadas, Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions ACM SIGARCH Computer Architecture News. ,vol. 33, pp. 25- 36 ,(2005) , 10.1145/1080695.1069974
H. Ozdoganoglu, T.N. Vijaykumar, C.E. Brodley, B.A. Kuperman, A. Jalote, SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address IEEE Transactions on Computers. ,vol. 55, pp. 1271- 1285 ,(2006) , 10.1109/TC.2006.166
Daniel J. Sorin, Milo M. K. Martin, Mark D. Hill, David A. Wood, SafetyNet ACM SIGARCH Computer Architecture News. ,vol. 30, pp. 123- 134 ,(2002) , 10.1145/545214.545229
Tao Zhang, Xiaotong Zhuang, S. Pande, Compiler Optimizations to Reduce Security Overhead symposium on code generation and optimization. pp. 346- 357 ,(2006) , 10.1109/CGO.2006.8
H.H. Feng, O.M. Kolesnikov, P. Fogla, W. Lee, Weibo Gong, Anomaly detection using call stack information ieee symposium on security and privacy. pp. 62- 75 ,(2003) , 10.1109/SECPRI.2003.1199328
Xiaotong Zhuang, Tao Zhang, Santosh Pande, HIDE Proceedings of the 11th international conference on Architectural support for programming languages and operating systems - ASPLOS-XI. ,vol. 39, pp. 72- 84 ,(2004) , 10.1145/1024393.1024403
Vladimir L. Kiriansky, Secure execution environment via program shepherding Massachusetts Institute of Technology. ,(2003)
J.P. McGregor, D.K. Karig, Z. Shi, R.B. Lee, A processor architecture defense against buffer overflow attacks international conference on information technology research and education. pp. 243- 250 ,(2003) , 10.1109/ITRE.2003.1270612
Werner Schindler, A timing attack against RSA with the Chinese Remainder Theorem Lecture Notes in Computer Science. pp. 109- 124 ,(2000)
A. One, Smashing The Stack For Fun And Profit Phrack. ,vol. 7, ,(1996)