The SPARC architecture manual: version 8
The SPARC architecture manual: version 8
The SPARC architecture manual (version 9)
The SPARC architecture manual (version 9)
Automatic test program generation for pipelined processors
ICCAD '94 Proceedings of the 1994 IEEE/ACM international conference on Computer-aided design
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Introduction to Automata Theory, Languages and Computability
Introduction to Automata Theory, Languages and Computability
Improving SAT-Based Bounded Model Checking by Means of BDD-Based Approximate Traversals
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Architecture for Protecting Critical Secrets in Microprocessors
Proceedings of the 32nd annual international symposium on Computer Architecture
Cupids: increasing information system security through the use of dedicated co-processing
Cupids: increasing information system security through the use of dedicated co-processing
Certifying program execution with secure processors
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Copilot - a coprocessor-based kernel runtime integrity monitor
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Aegis: A Single-Chip Secure Processor
IEEE Design & Test
Cell broadband engine processor vault security architecture
IBM Journal of Research and Development
Verifying security properties in electronic voting machines
Verifying security properties in electronic voting machines
Lares: An Architecture for Secure Active Monitoring Using Virtualization
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
VoteBox nano: a smaller, stronger FPGA-based voting machine
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
On device identity establishment and verification
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Security fusion: a new security architecture for resource-constrained environments
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Hi-index | 0.00 |
Security requires a holistic view. In this work we contribute to this goal by taking a new viewpoint, with the proposal of the logic-probabilistic framework FORTUNA to support the design and development of hardware-based-security systems (HwBSS). It extends and further substantiates our ideas presented in a previous conference paper (Gallo et al., 2011). Our contributions in this article are: (a) to extend and validate FORTUNA, and (b) to illustrate its effectiveness uncovering an unreported SPARC V8 architectural security flaw.