diff options
author | Iru Cai <mytbk920423@gmail.com> | 2019-05-02 22:01:18 +0800 |
---|---|---|
committer | Iru Cai <mytbk920423@gmail.com> | 2019-05-02 22:01:18 +0800 |
commit | f16f43275e60a5afc2239921cf42c0ee2435e931 (patch) | |
tree | 9a1acf666a2b8b1da6492d3ccfe0dad9ad297eed /thesis.bib | |
parent | 0babd3f3251fc26ea2f1cebdca2b3830ee045a24 (diff) | |
download | dissertation-f16f43275e60a5afc2239921cf42c0ee2435e931.tar.xz |
update
Diffstat (limited to 'thesis.bib')
-rw-r--r-- | thesis.bib | 42 |
1 files changed, 41 insertions, 1 deletions
@@ -227,6 +227,35 @@ doi={10.1109/MICRO.2018.00083}, ISSN={}, month=Oct,} +@inproceedings{dift, + title={Secure program execution via dynamic information flow tracking}, + author={Suh, G Edward and Lee, Jae W and Zhang, David and Devadas, Srinivas}, + booktitle={ACM Sigplan Notices}, + volume={39}, + number={11}, + pages={85--96}, + year={2004}, + organization={ACM} +} + +@inproceedings{raksha, + author = {Dalton, Michael and Kannan, Hari and Kozyrakis, Christos}, + title = {Raksha: A Flexible Information Flow Architecture for Software Security}, + booktitle = {Proceedings of the 34th Annual International Symposium on Computer Architecture}, + series = {ISCA '07}, + year = {2007}, + isbn = {978-1-59593-706-3}, + location = {San Diego, California, USA}, + pages = {482--493}, + numpages = {12}, + url = {http://doi.acm.org/10.1145/1250662.1250722}, + doi = {10.1145/1250662.1250722}, + acmid = {1250722}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {dynamic, semantic vulnerabilities, software security}, +} + @inproceedings{context-sensitive-fencing, title={Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization}, author={Taram, Mohammadkazem and Venkat, Ashish and Tullsen, Dean}, @@ -344,7 +373,7 @@ The BOOM generator was implemented using the Chisel hardware construction langua This thesis highlights two aspects of the BOOM design: its industry-competitive branch prediction and its configurable execution datapath. The remainder of the thesis discusses the BOOM tape-out, which was performed by two graduate students and demonstrated the ability to quickly adapt the design to the physical design issues that arose.} } -@misc{cryptoeprint:2018:808, +@misc{oisa, author = {Jiyong Yu and Lucas Hsiung and Mohamad El Hajj and Christopher W. Fletcher}, title = {Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing}, howpublished = {Cryptology ePrint Archive, Report 2018/808}, @@ -459,4 +488,15 @@ This thesis highlights two aspects of the BOOM design: its industry-competitive year = 2017, } +@article{gem5, + title={The gem5 simulator}, + author={Binkert, Nathan and Beckmann, Bradford and Black, Gabriel and Reinhardt, Steven K and Saidi, Ali and Basu, Arkaprava and Hestness, Joel and Hower, Derek R and Krishna, Tushar and Sardashti, Somayeh and others}, + journal={ACM SIGARCH Computer Architecture News}, + volume={39}, + number={2}, + pages={1--7}, + year={2011}, + publisher={ACM} +} + % vim:ts=4:sw=4 |