共 27 条
[1]
Barthe Gilles, 2011, FM 2011: Formal Methods. Proceedings 17th International Symposium on Formal Methods, P231, DOI 10.1007/978-3-642-21437-0_19
[2]
System-level Non-interference for Constant-time Cryptography
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1267-1279
[3]
Cache-leakage resilient OS isolation in an idealized model of virtualization
[J].
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2012,
:186-197
[5]
Bulygin Yuriy., 2014, Summary of attacks against BIOS and secure boot
[6]
DOMAS C., 2015, BLACKHAT US
[7]
Drzevitzky S., 2010, Proceedings 2010 International Conference on Field Programmable Logic and Applications (FPL 2010), P255, DOI 10.1109/FPL.2010.59
[8]
Duflot L., 2009, Getting into the SMRAM: SMM reloaded
[9]
Guo XL, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P124, DOI 10.1109/HST.2016.7495569
[10]
Intel, 2015, INT TRUST EX TECHN I