11 papers:
- TACAS-2015-BloemKKW #runtime #synthesis
- Shield Synthesis: — Runtime Enforcement for Reactive Systems (RB, BK, RK, CW), pp. 533–548.
- SEKE-2015-LinYX #automation #detection #generative #parametricity #testing
- Automatic Detection of Parameter Shielding for Test Case Generation (JL, JY, JX), pp. 571–574.
- OSDI-2014-BaumannPH
- Shielding Applications from an Untrusted Cloud with Haven (AB, MP, GCH), pp. 267–283.
- STOC-2013-MilesV
- Shielding circuits with groups (EM, EV), pp. 251–260.
- ICST-2011-MouelhiTABG #testing #web
- Tailored Shielding and Bypass Testing of Web Applications (TM, YLT, EA, BB, SG), pp. 210–219.
- SIGMOD-2009-NehmeLBR #approach #data type #named #privacy #security #towards
- StreamShield: a stream-centric approach towards security and privacy in data stream environments (RVN, HSL, EB, EAR), pp. 1027–1030.
- DAC-2008-PatelP #design #hardware #named #reliability #security
- SHIELD: a software hardware design methodology for security and reliability of MPSoCs (KP, SP), pp. 858–861.
- DAC-2006-WagnerBA #design #logic
- Shielding against design flaws with field repairable control logic (IW, VB, TMA), pp. 344–347.
- HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
- InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
- OSDI-2006-ReisDWDE #html #named
- BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML (CR, JD, HJW, OD, SE), pp. 61–74.
- DAC-2001-LepakLH #constraints
- Simultaneous Shield Insertion and Net Ordering under Explicit RLC Noise Constraint (KML, IL, LH), pp. 199–202.