Valerie Aurora, Lifetimes of cryptographic hash functions, 2012, html
Peng, Pai, Peng Ning, Douglas S. Reeves, On the secrecy of timing-based active watermarking trace-back techniques, 2006 IEEE symposium on security and privacy ](S&P’06) doi, pdf (using Kolmogorov-Smirnov test)
Martín Abadi, Mihai Budiu, Jay Ligatti, Control-flow integrity principles, implementations, and applications, ACM transactions on information and system security, Nov 2009 art.4 doi
Martín Abadi, Cédric Fournet, Access control based on execution history (2003) pdf
Martín Abadi, Logic in access control, 18th Annual IEEE Symposium of Logic in Comp. Sci. 2003 doi:LICS.2003.1210062
A. Sabelfeld, A.C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications 21:1, 2003 doi
W. Enck et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphonesdoi
Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, Jian-Wei Pan, Secure quantum key distribution with realistic devices, Rev. Mod. Phys. 92, 025002 doi
B. Parno, J. Howell, C. Gentry, M. Raykova, Pinocchio: nearly practical verifiable computation, in: Security and Privacy (SP), 2013 IEEE Symposium on. 238–252. IEEE (2013) iacr preprint pdf
Jérémie Decouchant et al. PAG: private and accountable gossip, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS); preprint pdf
Ranjit Kumaresan (Microsoft) Amortizing secure computation with penalties ACM CCS 2016 pdf
Moritz Lipp et al. Meltdown: reading kernel memory from user spacearxiv/1801.01207pdf
Paul Kocher et al. Spectre attacks: exploiting speculative execution, in: 40th IEEE Symposium on Security and Privacy (S\&P’19) (2019) arxiv/1801.01203
Execution enclaves
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit A. Seshia, A formal foundation for secure remote execution enclaves, eprint.iacr.org/2017/565.pdf
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclavedoi
sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves pdf
Strand spaces
Joshua D Guttman, F Javier Thayer, Authentication tests and the structure of bundles, Theoretical computer science, 283(2):333–380, 2002.
F. Javier Thayer Fabrega, Jonathan C. Herzog, Joshua D. Guttman, Strand Spaces: Why is a Security Protocol Correct?pdf; Strand spaces: proving security protocols correct, pdf
M. Abadi and M. R. Tuttle A semantics for a logic of au-thentication, Proceedings of the 10th ACM Symposium onPrinciples of Distributed Computing, pages 201–216, Au-gust 1991.