computer security

See also blockchain security.

- $n$Lab:arithmetic cryptography, wikipedia computer security, capability-based security
- blockchain, smart contract, digital identity, PSD2, blockchain security
- Andrej Dujella, literature on cryptography html
- Valerie Aurora,
*Lifetimes of cryptographic hash functions*, 2012, html - Peng, Pai, Peng Ning, Douglas S. Reeves,
*On the secrecy of timing-based active watermarking trace-back techniques*, 2006 IEEE symposium on security and privacy (S&P’06) doi, pdf (using Kolmogorov-Smirnov test)

- verified replay
- B. Parno, J. Howell, C. Gentry, M. Raykova,
*Pinocchio: nearly practical verifiable computation*, in: Security and Privacy (SP), 2013 IEEE Symposium on. 238–252. IEEE (2013) iacr preprint pdf - Jérémie Decouchant et al.
*PAG: private and accountable gossip*, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS); preprint pdf - Ranjit Kumaresan (Microsoft)
*Amortizing secure computation with penalties*ACM CCS 2016 pdf - P. Dovgalyuk,
*KVM deterministic replay*pdf - Michael Walfish, Andrew J. Blumberg,
*Verifying computations without reexecuting them*, Commun. ACM 58(2):74–84, 2015.

- Spectre and Meltdown: meltdownattack.com
- Moritz Lipp et al.
*Meltdown: reading kernel memory from user space*arxiv/1801.01207 pdf - Paul Kocher et al.
*Spectre attacks: exploiting speculative execution*, in: 40th IEEE Symposium on Security and Privacy (S\&P’19) (2019) arxiv/1801.01203

- Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit A. Seshia,
*A formal foundation for secure remote execution enclaves*, eprint.iacr.org/2017/565.pdf - Enclave programming model intel
*POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave*doi- sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves pdf

- Joshua D Guttman, F Javier Thayer,
*Authentication tests and the structure of bundles*, Theoretical computer science, 283(2):333–380, 2002. - F. Javier Thayer Fabrega, Jonathan C. Herzog, Joshua D. Guttman,
*Strand Spaces: Why is a Security Protocol Correct?*pdf; Strand spaces: proving security protocols correct_, pdf - M. Abadi and M. R. Tuttle
*A semantics for a logic of au-thentication*, Proceedings of the 10th ACM Symposium onPrinciples of Distributed Computing, pages 201–216, Au-gust 1991. - Ryan Culpepper,
*Strand spaces*, slides pdf - jherzog
- Strand Spaces with Choice via a Process Algebra Semantics pdf
- Y Li, Ju Pang,
*An inductive approach to strand spaces*, pdf - Allaa Kamil, Gavin Lowe,
*Specifying and modelling secure channels in strand spaces*pdf

Last revised on August 10, 2019 at 06:35:25. See the history of this page for a list of all contributions to it.