Author:
Mounier Laurent,Sifakis Emmanuel
Publisher
Springer Berlin Heidelberg
Reference43 articles.
1. Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, vol. 13, pp. 22–22. USENIX Association, Berkeley (2004)
2. Crandall, J.R., Wu, S.F., Chong, F.T.: Minos: Architectural support for protecting control data. ACM Trans. Archit. Code Optim. 3(4), 359–389 (2006)
3. Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. SIGARCH Comput. Archit. News 32(5), 85–96 (2004)
4. Clemente, P., Rouzaud-Cornabas, J., Toinard, C.: Transactions on computational science xi, pp. 131–161. Springer, Heidelberg (2010)
5. Volpano, D., Smith, G.: A type-based approach to pro-gram security. In: Proceedings of the 7th International Joint Conference on the Theory and Practice of Software Development, pp. 607–621. Springer (1997)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling;IEEE Transactions on Software Engineering;2020-09-01
2. Dynamic Information-Flow Analysis for Multi-threaded Applications;Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change;2012