Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005. ,
DOI : 10.1145/1102120.1102165
AMD Security and Server innovation, 2013. ,
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity, Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10, pp.38-49, 2010. ,
A new class of vulnerabilities in SMI handlers, 2015. ,
QEMU, a Fast and Portable Dynamic Translator, Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05). USENIX Association, pp.41-46, 2005. ,
The gem5 simulator, ACM SIGARCH Computer Architecture News, vol.39, issue.2, pp.1-7, 2011. ,
DOI : 10.1145/2024716.2024718
Jumporiented programming: a new class of code-reuse attack, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11, pp.30-40, 2011. ,
BARing the System: New vulnerabilities in Coreboot & UEFI based systems, 2017. ,
Chipset based approach to detect virtualization malware, 2008. ,
Control-Flow Integrity, ACM Computing Surveys, vol.50, issue.1, p.16, 2017. ,
DOI : 10.1007/978-3-319-26362-5_4
Full-System Simulation of big. LITTLE Multicore Architecture for Performance and Energy Exploration, Proceedings of the 10th International Symposium on Embedded Multicore/Manycore Systems-on-Chip (MCSoC, pp.201-208, 2016. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01418745
Control-flow bending: On the effectiveness of control-flow integrity, Proceedings of the 24th USENIX Security Symposium (SEC'15). USENIX Association, pp.161-176, 2015. ,
Return-oriented programming without returns, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.559-572, 2010. ,
DOI : 10.1145/1866307.1866370
URL : http://www.cse.ucsd.edu/%7Ehovav/dist/noret-ccs.pdf
A quantitative analysis on microarchitectures of modern CPU-FPGA platforms, Proceedings of the 53rd Annual Design Automation Conference on, DAC '16, 2016. ,
DOI : 10.1109/ICCAD.2015.7372648
HAFIX, Proceedings of the 52nd Annual Design Automation Conference on, DAC '15, p.74, 2015. ,
DOI : 10.1145/1315245.1315313
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, pp.401-416, 2014. ,
Performance implications of System Management Mode, 2013 IEEE International Symposium on Workload Characterization (IISWC), pp.163-173, 2013. ,
DOI : 10.1109/IISWC.2013.6704682
Getting into the SMRAM: SMM Reloaded, 2009. ,
SMM rootkits, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1590-1605, 2013. ,
DOI : 10.1145/1460877.1460892
Control Jujutsu, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.901-913, 2015. ,
DOI : 10.1109/SP.2009.25
ROPGuard: Runtime prevention of return-oriented programming attacks, 2012. ,
On Achieving High Message Rates, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, pp.498-505, 2013. ,
DOI : 10.1109/CCGrid.2013.43
Your USB cable, the spy: Inside the NSA's catalog of surveillance magic, 2013. ,
Hyper- Transport 3.1 Interconnect Technology, 2008. ,
HP Sure Start: Automatic Firmware Intrusion Detection and Repair System, 2016. ,
HP Sure Start Gen3, 2017. ,
HP Sure Start with Runtime Intrusion Detection, 2009. ,
ATRA, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.167-178, 2014. ,
DOI : 10.1109/TIFS.2013.2266095
How Many Million BIOSes Would you Like to Infect? CanSecWest, 2015. ,
LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., pp.75-88, 2004. ,
DOI : 10.1109/CGO.2004.1281665
Making Context- Sensitive Points-to Analysis with Heap Cloning Practical For The Real World, 2007. ,
KI-Mon: A Hardware-assisted Eventtriggered Monitoring Platform for Mutable Kernel Object, Proceedings of the 22th USENIX Security Symposium. USENIX Association, pp.511-526, 2013. ,
Towards a practical solution to detect code reuse attacks on ARM mobile devices, Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP '15, 2015. ,
DOI : 10.1145/1315245.1315260
Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems TrendLabs Security Intelligence Blog from https://blog.trendmicro.com/trendlabs-security-intelligence/ hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems, 2013. ,
VELO: A Novel Communication Engine for Ultra-Low Latency Message Transfers, 2008 37th International Conference on Parallel Processing, pp.238-245, 2008. ,
DOI : 10.1109/ICPP.2008.85
URL : http://ra.ziti.uni-heidelberg.de/pages/publications/papers/2008/1.pdf
TCCluster: A Cluster Architecture Utilizing the Processor Host Interface as a Network Interconnect, 2010 IEEE International Conference on Cluster Computing, 2010. ,
DOI : 10.1109/CLUSTER.2010.37
CPU Transparent Protection of OS Kernel and Hypervisor Integrity with Programmable DRAM, Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13, pp.392-403, 2013. ,
Demystifying the Secure Enclave Processor, Black Hat Las Vegas, 2016. ,
The Rust Language, Proceedings of the 2014 ACM SIGAda Annual Conference on High Integrity Language Technology (HILT '14, pp.103-104, 2014. ,
Vigilare, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.28-37, 2012. ,
DOI : 10.1145/2382196.2382202
Modular control-flow integrity, ACM SIGPLAN Notices, vol.49, issue.6, pp.577-587, 2014. ,
DOI : 10.1145/2666356.2594295
Exploring and exploiting Lenovo firmware secrets, 2016. ,
Copilot -a Coprocessor-based Kernel Runtime Integrity Monitor, Proceedings of the 13th USENIX Security Symposium. USENIX Association, pp.179-194, 2004. ,
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data, Proceedings of the 15th USENIX Security Symposium. USENIX Association, 2006. ,
SMM unchecked pointer vulnerability, 2016. ,
Return-Oriented Programming, ACM Transactions on Information and System Security, vol.15, issue.1, p.1, 2012. ,
DOI : 10.1145/2133375.2133377
Boot with Integrity, or Don't Boot In Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Apress, pp.143-163, 2014. ,
Popcorn Linux: enabling efficient inter-core communication in a Linux-based multikernel operating system. Master's thesis, 2013. ,
Security Vulnerability in Processor-Interconnect Router Design, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.358-368, 2014. ,
DOI : 10.1145/2485922.2485972
Enforcing forward-edge controlflow integrity in gcc & llvm, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, pp.941-955, 2014. ,
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, pp.380-395, 2010. ,
DOI : 10.1109/SP.2010.30
URL : http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND10.pdf
Attacking SMM memory via Intel CPU cache poisoning, 2009. ,
CFIMon: Detecting Violation of Control Flow Integrity Using Performance Counters, Proceedings of the 2012 42Nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '12, pp.1-12, 2012. ,
A Tour Beyond BIOS Implementing UEFI Authenticated Variables in SMM with EDKII, 2014. ,
A Tour Beyond BIOS Supporting an SMM Resource Monitor using the EFI Developer Kit II, 2015. ,
A Tour Beyond BIOS Memory Practices in UEFI, 2015. ,
Control Flow Integrity for COTS Binaries, Proceedings of the 22th USENIX Security Symposium. USENIX Association, pp.337-352, 2013. ,
DOI : 10.1145/2818000.2818016
URL : http://dl.acm.org/ft_gateway.cfm?id=2818016&type=pdf
Secure coprocessor-based intrusion detection, Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC , EW10, pp.239-242, 2002. ,
DOI : 10.1145/1133373.1133423