

Data Self-Healing Technique Using ASIC Level Security Mechanisms
Abstract
Keywords
References
S.Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R.K. Iyer, “Defeating Memory Corruption Attacks via Pointer Taintedness Detection”, in the proceedings of the International conference on Dependable Systems and networks ( DSN). Japan, June 2005.
S. Chen, J. Xu, E. C. Sezer, P.Gauriar, and R.K.Iyer, “Non-Control-Data Attacks Are Realistic Threats”, in the proceedings of the 14th USENIX Security symposium, Batlimore, MD, Aug. 2005.
M.Dalton, H. Kannan, and C. Kozvrakis, “Deconstructing Hardware Architectures for Security”, in the 5th Annual Workshop on Duplicating, Deconstructing and Debunking, Boston, MA, June 2006.
B. Livshits, M. Martin, and M.S. Lam, “Securely: Runtime Protection and recovery from Web Application Vulnerabilities”, Technical Report, Stanford University, Sept. 2006.
J. Newsome and D. X. Song, “Dynamic Taint Analysis, and Signature Generation of Exploits on Commodity Software”, in the Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.
F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y. Wu, “LIFT: A Low- Level- Overhead Practical Information Flow Tracking System for Detecting Security Attacks”, in the proceedings of the 39th Intl. Symposium on Micro-architecture, Orlando, FL, Dec. 2006.
W. Shi, H.-H. Lee, G. Gu, Falk, T. Mudge, and M. Ghosh, “Infoshield: A Security Architecture for Protecting Information Usage in Memory”, in the proceedings of the 12th International Symposium on High- Performance Computer Architecture, Austin, TX, Feb. 2006.
W. Xu, S. Bhaskar, and R. Sekar, “Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks”, in the proceedings of the 15th USENIX Security Conference, Vancouver Canada, 2006.
Michael Dalton, Hari Kannan, Christos Kozyrakis, “Raksha: A Flexible Information Flow Architecture”, for Software Security from the technical paper, Computer Systems Laboratory, Stanford University, mwdalton, hkannan, 2006.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.