Formally Verifying Isolation and Availability in an Idealized Model of Virtualization, FM 2011: Formal Methods, pp.231-245, 2011. ,
DOI : 10.1007/s10207-004-0057-5
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization, 2012 IEEE 25th Computer Security Foundations Symposium, pp.2012-2037, 2012. ,
DOI : 10.1109/CSF.2012.17
URL : http://doi.org/10.1109/csf.2012.17
System-level noninterference for constant-time cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.1267-1279, 2014. ,
DOI : 10.1145/2660267.2660283
URL : https://hal.archives-ouvertes.fr/hal-01101950
Enforceable security policies revisited, ACM Transactions on Information and System Security (TISSEC), vol.16, issue.1, p.3, 2013. ,
DOI : 10.1007/978-3-642-28641-4_17
Setup For Failure: Defeating Secure Boot ,
The Memory Sinkhole, In: BlackHat USA, 2015. ,
Proof-Carrying Hardware: Runtime Formal Verification for Secure Dynamic Reconfiguration, 2010 International Conference on Field Programmable Logic and Applications, pp.255-258, 2010. ,
DOI : 10.1109/FPL.2010.59
URL : http://www.cs.uni-paderborn.de/fileadmin/Informatik/AG-Platzner/publications/drzevitzky10_fpl/drzevitzky10_fpl.pdf
Scalable SoC trust verification using integrated theorem proving and model checking, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.124-129, 2016. ,
DOI : 10.1109/HST.2016.7495569
CHIPSEC: Platform Security Assessment Framework ,
Desktop 4th Generation Intel Core Processor Family, Desktop Intel Pentium Processor Family, and Desktop Intel Celeron Processor Family ,
Speed racer: Exploiting an intel flash protection race condition ,
Coq, Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP '13, pp.13-24, 2013. ,
DOI : 10.1145/2505879.2505897
URL : https://hal.archives-ouvertes.fr/hal-01081548
SpecCert: Specifying and Verifying Hardware-Based Security Enforcement, Centrale- Supélec ; Agence Nationale de Sécurité des Systèmes d'Information, 2016. ,
DOI : 10.1145/1785414.1785443
URL : https://hal.archives-ouvertes.fr/hal-01356690
Specifying and verifying hardware for tamper-resistant software, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.166-177, 2003. ,
DOI : 10.1109/SECPRI.2003.1199335
URL : http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/LIE_IEEESP04.pdf
Getting into the SMRAM: SMM reloaded CanSecWest ,
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition. Information Forensics and Security, IEEE Transactions on, vol.7, issue.1, pp.25-40, 2012. ,
DOI : 10.1109/tifs.2011.2160627
Trusted module acquisition through proof-carrying hardware intellectual property, Tech. rep, 2015. ,
RockSalt, ACM SIGPLAN Notices, vol.47, issue.6, pp.395-404, 2012. ,
DOI : 10.1145/2038642.2038687
Attacking intel TXT via SINIT code execution hijacking ,
Attacking SMM memory via intel CPU cache poisoning ,
Preventing and detecting xen hypervisor subversions, Blackhat Briefings USA, 2008. ,
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://www.cs.cornell.edu/fbs/publications/99-1759.pdf
x86-TSO, Communications of the ACM, vol.53, issue.7, pp.89-97, 2010. ,
DOI : 10.1145/1785414.1785443