共 43 条
[1]
Abadi M, 2005, P 12 ACM C COMP COMM, P340, DOI [10.1145/1102120.1102165, DOI 10.1145/1102120.1102165]
[2]
Preventing memory error exploits with WIT
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:263-+
[3]
[Anonymous], 2018, Amazon Elastic Compute Cloud
[4]
[Anonymous], 2005, P 14 C USENIX SEC S
[5]
[Anonymous], 2013, CVE-2013-2028
[6]
ARM, 2016, ARM EMB TRAC MACR AR ARM EMB TRAC MACR AR
[7]
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:90-102
[8]
Shielding Applications from an Untrusted Cloud with Haven
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2015, 33 (03)
[9]
Beeman S, 2017, SUPPORTED PROCESSORS
[10]
Bletsch Tyler, 2011, P 6 ACM S INF COMP C, P30