Are hardware performance counters a cost effective way for integrity checking of programs
- 17 October 2011
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Evil maid goes after PGP whole disk encryptionPublished by Association for Computing Machinery (ACM) ,2010
- Using Hardware Performance Counters for Fault LocalizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Distilling Free-Form Natural Laws from Experimental DataScience, 2009
- Can hardware performance counters be trusted?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- TOCTOU, Traps, and Trusted ComputingLecture Notes in Computer Science, 2008
- Comparing Benchmarks Using Key Microarchitecture-Independent CharacteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- CODESSEAL: Compiler/FPGA Approach to Secure ApplicationsLecture Notes in Computer Science, 2005
- Enabling trusted software integrityPublished by Association for Computing Machinery (ACM) ,2002
- Processor Control Flow Monitoring Using Signatured Instruction StreamsIEEE Transactions on Computers, 1987