共 30 条
[1]
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[2]
[Anonymous], 2017, COQ V 8 7
[3]
Gradual release: Unifying declassification, encryption and key release policies
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:207-+
[4]
Cryptographic Enforcement of Language-Based Information Erasure
[J].
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015,
2015,
:334-348
[5]
Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies
[J].
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2012,
:308-322
[6]
Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time"
[J].
IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018),
2018,
:328-343
[7]
Securing Compilation Against Memory Probing
[J].
PLAS'18: PROCEEDINGS OF THE 13TH WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY,
2018,
:29-40
[8]
Verifying Constant-Time Implementations by Abstract Interpretation
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:260-277
[9]
Language-based information erasure
[J].
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2005,
:241-254
[10]
End-to-end enforcement of erasure and declassification
[J].
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS,
2008,
:98-111