Sciweavers

3 search results - page 1 / 1
» Covert Flow Trees: A Technique for Identifying and Analyzing...
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 4 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...