- Abelson, H. et al. The risks of key recovery, key escrow, and trusted third-party encryption. World-Wide Web Journal 2, 3 (Summer 1997), 241--257. Google ScholarDigital Library
- Abelson, H. et al. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity 1, 1 (Nov. 2015), Oxford University Press; http://www.cybersecurity.oxfordjournals.org/content/1/1/69Google Scholar
- Bellovin, S.M. The key to the key. IEEE Security and Privacy 13, 6 (Nov.-Dec. 2015), 96--96. Google ScholarDigital Library
- Clark, D.D. et al. Computers at Risk: Safe Computing in the Information Age. National Research Council, National Academies Press, Washington, D.C., 1990. Google ScholarDigital Library
- Dam, K.W. and Lin, H.S., Eds. Cryptography's role in securing the information society. National Research Council, National Academies Press, Washington, D.C., 1996. Google ScholarDigital Library
- Goodman, S.E. and Lin, H.S., Eds. Toward a safer and more secure cyberspace. National Research Council, National Academies Press, Washington, D.C., 2007.Google Scholar
- Landau, S. et al. Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy. (ACM-sponsored study), 1994.Google Scholar
- Neumann P.G. Computer-Related Risks. Addison-Wesley and ACM Press, 1995. Google ScholarDigital Library
- Neumann, P.G. Principled assuredly trustworthy composable architectures, final report. SRI International, 2004; http://www.csl.sri.com/neumann/chats4.pdfGoogle Scholar
- Neumann, P.G. Fundamental trustworthiness principles in CHERI. In New Solutions for Cybersecurity, MIT Press, Cambridge, MA, 2018.Google Scholar
- Schneider, F.B. and Blumenthal, M., Eds. Trust in Cyberspace. National Research Council, National Academies Press, 2101 Constitution Ave., Washington, D.C., 1998. Google ScholarDigital Library
- Shrobe, H. et al., Eds. Solutions for Cybersecurity. MIT Press, 2018. Google ScholarDigital Library
- Van Bulck et al. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. USENIX Security (Aug. 14--17, 2013); http://foreshadowattack.eu/Google Scholar
- Watson, R.N.M. et al. Capability hardware enhanced RISC instructions (CHERI): Notes on the Meltdown and Spectre attacks. University of Cambridge Technical Report 916, 2017; http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-916.pdfGoogle Scholar
- Weisse, O. et al. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution (Aug. 14, 2018); http://foreshadowattack.eu/.Google Scholar
Index Terms
- The big picture
Comments