LEE, R. B., KWAN, P. C., MCGREGOR,
J. P., DWOSKIN, J., AND WANG, Z. Architecture for protecting critical secrets
in microprocessors. In Proc. Intl. Symposium on Computer Architecture (2005),
pp. 2–13.
M. Blanchou and P. Youn. Password
managers: Exposing passwords everywhere, Nov 2013. https://www.isecpartners.com/media/106983/password_managers_nov13.pdf
R. Wang, S. Chen, and X. Wang.
Signing me onto your accounts through facebook and google: A traffic-guided
security study of commercially deployed single-sign-on web services. In Security
and Privacy (SP), 2012 IEEE Symposium on, pages 365–379,
2012.
BARRY, P., AND HARTNETT, G. Designing
Embedded Networking Applications: Essential Insights for Developers of Intel IXP4XX
Network Processor Systems, first ed. Intel Press, May 2005, p. 47
DWOSKIN, J., AND LEE, R. B. Hardware-rooted
trust for secure key management and transient trust. In Proc. 14th ACM
Conference on Computer and Communications Security (Oct. 2007), pp. 389–400
GUTMANN, P. Data remanence in semiconductor
devices. In Proc. 10th USENIX Security Symposium (Aug. 2001), pp. 39–54
SCHEICK, L. Z., GUERTIN, S. M., AND
SWIFT, G. M. Analysis of radiation effects on individual DRAM cells. IEEE
Transactions on Nuclear Science 47 (Dec. 2000), 2534–2538.
No comments:
Post a Comment