Author:
Parameswaran Sri,Wolf Tilman
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Software
Reference89 articles.
1. Aciiçmez O, Koç ÇK, Seifert J-P (2007) On the power of simple branch prediction analysis. In: ASIACCS ’07: proceedings of the 2nd ACM symposium on information, computer and communications security. ACM, New York, pp 312–320
2. Arora D, Ravi S, Raghunathan A, Jha NK (2005) Secure embedded processing through hardware-assisted runtime monitoring. In: Proceedings of the design, automation and test in Europe (DATE’05), vol 1
3. Ashcraft K, Engler D (2002) Using programmer-written compiler extensions to catch security holes. In: SP ’02: proceedings of the 2002 IEEE symposium on security and privacy. IEEE Computer Society, Washington, p 143
4. Austin TM, Breach SE, Sohi GS (1994) Efficient detection of all pointer and array access errors. In: PLDI ’94: proceedings of the ACM SIGPLAN 1994 conference on programming language design and implementation. ACM, New York, pp 290–301
5. Baratloo A, Singh N, Tsai T (2000) Transparent run-time defense against stack smashing attacks. In: Proceedings of 9th USENIX security symposium, June 2000
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Memory Protection with Cached Authentication Trees;2024 31st International Conference on Mixed Design of Integrated Circuits and System (MIXDES);2024-06-27
2. SoK: Security in Real-Time Systems;ACM Computing Surveys;2024-04-25
3. Formal Verification of Secure Boot Process;2024 Design, Automation & Test in Europe Conference & Exhibition (DATE);2024-03-25
4. Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDs;ACM Transactions on Storage;2024-02-19
5. Prevention of Controller Area Network (CAN) Attacks on Electric Autonomous Vehicles;Applied Sciences;2023-08-18