summaryrefslogtreecommitdiff
path: root/thesis.bib
diff options
context:
space:
mode:
authorIru Cai <mytbk920423@gmail.com>2019-05-02 22:01:18 +0800
committerIru Cai <mytbk920423@gmail.com>2019-05-02 22:01:18 +0800
commitf16f43275e60a5afc2239921cf42c0ee2435e931 (patch)
tree9a1acf666a2b8b1da6492d3ccfe0dad9ad297eed /thesis.bib
parent0babd3f3251fc26ea2f1cebdca2b3830ee045a24 (diff)
downloaddissertation-f16f43275e60a5afc2239921cf42c0ee2435e931.tar.xz
update
Diffstat (limited to 'thesis.bib')
-rw-r--r--thesis.bib42
1 files changed, 41 insertions, 1 deletions
diff --git a/thesis.bib b/thesis.bib
index 6c5ffcb..3e38ef0 100644
--- a/thesis.bib
+++ b/thesis.bib
@@ -227,6 +227,35 @@ doi={10.1109/MICRO.2018.00083},
ISSN={},
month=Oct,}
+@inproceedings{dift,
+ title={Secure program execution via dynamic information flow tracking},
+ author={Suh, G Edward and Lee, Jae W and Zhang, David and Devadas, Srinivas},
+ booktitle={ACM Sigplan Notices},
+ volume={39},
+ number={11},
+ pages={85--96},
+ year={2004},
+ organization={ACM}
+}
+
+@inproceedings{raksha,
+ author = {Dalton, Michael and Kannan, Hari and Kozyrakis, Christos},
+ title = {Raksha: A Flexible Information Flow Architecture for Software Security},
+ booktitle = {Proceedings of the 34th Annual International Symposium on Computer Architecture},
+ series = {ISCA '07},
+ year = {2007},
+ isbn = {978-1-59593-706-3},
+ location = {San Diego, California, USA},
+ pages = {482--493},
+ numpages = {12},
+ url = {http://doi.acm.org/10.1145/1250662.1250722},
+ doi = {10.1145/1250662.1250722},
+ acmid = {1250722},
+ publisher = {ACM},
+ address = {New York, NY, USA},
+ keywords = {dynamic, semantic vulnerabilities, software security},
+}
+
@inproceedings{context-sensitive-fencing,
title={Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization},
author={Taram, Mohammadkazem and Venkat, Ashish and Tullsen, Dean},
@@ -344,7 +373,7 @@ The BOOM generator was implemented using the Chisel hardware construction langua
This thesis highlights two aspects of the BOOM design: its industry-competitive branch prediction and its configurable execution datapath. The remainder of the thesis discusses the BOOM tape-out, which was performed by two graduate students and demonstrated the ability to quickly adapt the design to the physical design issues that arose.}
}
-@misc{cryptoeprint:2018:808,
+@misc{oisa,
author = {Jiyong Yu and Lucas Hsiung and Mohamad El Hajj and Christopher W. Fletcher},
title = {Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing},
howpublished = {Cryptology ePrint Archive, Report 2018/808},
@@ -459,4 +488,15 @@ This thesis highlights two aspects of the BOOM design: its industry-competitive
year = 2017,
}
+@article{gem5,
+ title={The gem5 simulator},
+ author={Binkert, Nathan and Beckmann, Bradford and Black, Gabriel and Reinhardt, Steven K and Saidi, Ali and Basu, Arkaprava and Hestness, Joel and Hower, Derek R and Krishna, Tushar and Sardashti, Somayeh and others},
+ journal={ACM SIGARCH Computer Architecture News},
+ volume={39},
+ number={2},
+ pages={1--7},
+ year={2011},
+ publisher={ACM}
+}
+
% vim:ts=4:sw=4