Amanote Research

Amanote Research

    RegisterSign In

Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis

ACM SIGARCH Computer Architecture News
doi 10.1145/3093337.3037739
Full Text
Open PDF
Abstract

Available in full text

Date

May 11, 2017

Authors
Andrew FerraiuoloRui XuDanfeng ZhangAndrew C. MyersG. Edward Suh
Publisher

Association for Computing Machinery (ACM)


Related search

Architecture of Information Security Policies: A Content Analysis

Advances in Intelligent Systems and Computing
ControlSystems EngineeringComputer Science
2016English

A Translator With a Security Static Analysis Feature of an Information Flow for a Simple Programming Language

Modeling and Analysis of Information Systems
2014English

Practical Precise Taint-Flow Static Analysis for Android App Sets

2018English

Security Analysis of Role-Based Access Control Through Program Verification

2012English

Operational Information Management Security Architecture

2006English

Static Analysis for Proactive Security

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2019English

Web Services Security Development and Architecture: Theoretical and Practical Issues

Choice Reviews Online
2010English

A Practical Type Analysis for Verification of Modular Prolog Programs

2008English

VeriTrust: Verification for Hardware Trust

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
ElectricalSoftwareComputer GraphicsComputer-Aided DesignElectronic Engineering
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy