Page 359 - 《软件学报》2021年第12期
P. 359

刘畅  等:RISC-V 指令集架构研究综述                                                           4023


        [119]    Wright JC, Schmidt C, Keller B, et al. A dual-core RISC-V vector processor with on-chip fine-grain power management in 28-nm
             FD-SOI. IEEE Trans. on Very Large Scale Integration (VLSI) Systems, 2020(28):2721−2725. [doi: 10.1109/TVLSI.2020.3030243]
        [120]    Albartus N, Nasenberg C, Stolz F, et al. On the design and misuse of microcoded (embedded) processors — A cautionary note.
             Proc. of the 30th USENIX Security Symp. USENIX Association, 2021. 267−284. https://www.usenix.org/conference/usenix
             security21/presentation/albartus
        [121]    Lee D, Kohlbrenner D, Shinde S, et al. Keystone: An open framework for architecting trusted execution environments. In: Proc. of
             the 15th  European Conf. on  Computer Systems.  New  York: Association for  Computing Machinery, 2020. 1−16. [doi:  10.
             1145/3342195.3387532]
        [122]    Burow N, Carr SA, Nash J, et al. Control-flow integrity: Precision, security, and performance. ACM Computing Surveys, 2017(50):
             1−33. [doi: 10.1145/3054924]
        [123]    One A. Smashing the stack for fun and Profit. 1996. https://web.archive.org/web/20100514141355/http://www.phrack.com/issues.
             html?issue=49&id=14&mode=txt
        [124]    Cowan C, Pu C, Maier D, et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. of
             the 7th Conf. on USENIX Security Symp. USENIX Association, 1998(7):5. https://dl.acm.org/doi/10.5555/1267549.1267554
        [125]    Abadi M, Budiu M, Erlingsson U, et al. Control-flow integrity: Principles, implementations, and applications. Proc. of the 2005
             ACM Conf.  on Computer and Communications  Security  (CCS  2005). New York: Association  for Computing Machinery,  2005,
             13(1):1−40. [doi: 10.1145/1609956.1609960]
        [126]    De  A, Basu A, Ghosh  S,  et al.  Hardware  assisted buffer protection  mechanisms for  embedded RISC-V. IEEE  Trans. on
             Computer-Aided Design of Integrated Circuits and Systems, 2020. 4453−4465. [doi: 10.1109/TCAD.2020.2984407]
        [127]    Wilander J, Kamkar M. A comparison of publicly available tools for dynamic buffer overflow prevention. In: Proc. of the Network
             and Distributed System Security Symp., NDSS 2003. 2003(3):149−162.
        [128]    Ferraiuolo A, Zhao  M, Myers  AC,  et al.  HyperFlow: A processor  architecture for nonmalleable, timing-safe information flow
             security. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. 2018. 1583−1600. [doi: 10.1145/
             3243734.3243743]
        [129]    Gallagher M, Biernacki L, Chen SB, et al. Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving
             target defenses with churn. In: Proc. of the 24th Int’l Conf. on Architectural Support for Programming Languages and Operating
             Systems. New York: Association for Computing Machinery, 2019. 469−484. [doi: 10.1145/3297858.3304037]
        [130]    Bresch C, Hely D, Lysecky R, et al. TrustFlow-X: A practical framework for fine-grained control-flow integrity in critical systems.
             ACM Trans. on Embedded Computing Systems, 2020,19(5):1−26. [doi: 10.1145/3398327]
        [131]    Hu H, Shinde S, Adrian S, et al. Data-oriented programming: on the expressiveness of non-control data attacks. In: Proc. of the
             2016 IEEE Symp. on Security and Privacy (SP). 2016. 969−986. [doi: 10.1109/SP.2016.62]
        [132]    Nyman T, Dessouky G, Zeitouni S, et al. HardScope: Hardening embedded systems against data-oriented attacks. In: Proc. of th
             56th ACM/IEEE Design Automation Conf. (DAC). 2019. 1−6.
        [133]    Menon A,  Murugan  S, Rebeiro C,  et al. Shakti-T : A  RISC-V processor with light  weight security  extensions. In: Proc. of the
             Hardware and Architectural Support for Security and Privacy. New York: Association for Computing Machinery, 2017. 1−8. [doi:
             10.1145/3092627.3092629]
        [134]    Wong MM, Haj-Yahya J, Chattopadhyay A. SMARTS: Secure memory assurance of RISC-V trusted SoC. In: Proc. of the 7th Int’l
             Workshop on Hardware and Architectural Support for Security and Privacy. New York: Association for Computing Machinery,
             2018. 1−8. [doi: 10.1145/3214292.3214298]
        [135]    Kokologiannakis M, Vafeiadis  V. HMC: Model checking  for  hardware memory models.  In:  Proc.  of  the 25th  Int’l Conf.  on
             Architectural Support for Programming Languages  and Operating Systems.  New  York: Association for  Computing  Machinery,
             2020. 1157−1171. [doi: 10.1145/3373376.3378480]
        [136]    Joy PG, Prabhu M, Shanmugalakshmi R. Side channel attack-survey. Int’l Journal of Advanced Scientific Research and Review,
             2011,1(4):54−57.
        [137]    Guo DX, Chen KY, Zhang Y, et al. A survey of side-channel attack and security assessment for cryptographic equipment. Proc. of
             the 7th Int’l Conf. on Computer Engineering and Networks (CENet2017). 2017(299). [doi: 10.22323/1.299.0042]
        [138]    Saxena S, Sanyal G, Manu. Cache based side channel attack: A Survey. In: Proc. of the Int’l Conf. on Advances in Computing,
             Communication Control and Networking (ICACCCN). 2018. 278−284. [doi: 10.1109/ICACCCN.2018.8748811]
        [139]    Devi  M,  Majumder A. Side-channel  attack in Internet  of Things:  A survey. In: Applications of Internet of  Things. Singapore  :
             Springer Singapore, 2021. 213−222. [doi: 10.1007/978-981-15-6198-6_20]
   354   355   356   357   358   359   360   361   362   363   364