Complete information flow tracking from the gates up
- 7 March 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 44 (3), 109-120
- https://doi.org/10.1145/1508244.1508258
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Understanding and visualizing full systems with data flow tomographyPublished by Association for Computing Machinery (ACM) ,2008
- Yet another MicroArchitectural Attack:Published by Association for Computing Machinery (ACM) ,2007
- RakshaPublished by Association for Computing Machinery (ACM) ,2007
- Cache Attacks and Countermeasures: The Case of AESLecture Notes in Computer Science, 2006
- RIFLE: An Architectural Framework for User-Centric Information-Flow SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Minos: Control Data Attack Prevention Orthogonal to Memory ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Architecture for Protecting Critical Secrets in MicroprocessorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Electromagnetic Analysis: Concrete ResultsLecture Notes in Computer Science, 2001
- Certification of programs for secure information flowCommunications of the ACM, 1977