咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...

主题

  • 2 篇 untrusted comput...
  • 1 篇 machines
  • 1 篇 data security
  • 1 篇 memory attacks
  • 1 篇 registers
  • 1 篇 weird machines
  • 1 篇 safety
  • 1 篇 1-piperidinocycl...
  • 1 篇 fpcc
  • 1 篇 security of data
  • 1 篇 primary componen...
  • 1 篇 formal system
  • 1 篇 proof-carrying c...
  • 1 篇 program processo...
  • 1 篇 computational mo...
  • 1 篇 machine abstract...
  • 1 篇 consumer safety
  • 1 篇 semantics
  • 1 篇 codes
  • 1 篇 security

机构

  • 1 篇 bloomberg lp ny ...
  • 1 篇 siberian fed uni...

作者

  • 1 篇 styugin mikhail
  • 1 篇 vanegue julien

语言

  • 1 篇 英文
  • 1 篇 其他
检索条件"主题词=untrusted computations"
2 条 记 录,以下是1-10 订阅
排序:
Indistinguishable Executable Code Generation Method
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第8期10卷 315-324页
作者: Styugin, Mikhail Siberian Fed Univ Krasnoyarsk Russia
The classical objective of obfuscation considers indistinguishability of the obtained code in relation to original programs of equal functionality. The present paper reviews another objective of obfuscation, when indi... 详细信息
来源: 评论
The Weird Machines in Proof-Carrying Code
The Weird Machines in Proof-Carrying Code
收藏 引用
35th IEEE-Computer-Society Workshop on Security and Privacy (SP)
作者: Vanegue, Julien Bloomberg LP New York NY 10022 USA
We review different attack vectors on Proof-Carrying Code (PCC) related to policy, memory model, machine abstraction, and formal system. We capture the notion of weird machines in PCC to formalize the shadow execution... 详细信息
来源: 评论