类 型
30 篇文献
 
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines  
Abstract. Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these plat......
Transactions on Computational Science  2009
5次引用 0 0
Efficient data protection for distributed shared memory multiprocessors  
Data security in computer systems has recently become an increasing concern, and hardware-based attacks have emerged. As a result, researchers have investigated hardware encryption and authentication ......
International Conference on Parallel Architectures and Compilation Techniques  2006
13次引用 0 0
Une architecture efficace combinant chiffrement, inté- grité mémoire et protection contre les fuites d'informa- tions permettant du calcul distribué sûr  
ABSTRACT.Several secure computing,hardware,architectures using mem ory encryption and mem- ory integrity checkers have been proposed,during the past fe w years to provide applications with a tamper re......
0次引用 0 0
Accelerating memory decryption and authentication with frequent value prediction  
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have used memory block en......
Conference On Computing Frontiers  2007
0次引用 0 0
Memory Security Management for Reconfigurable Embedded Systems  
The constrained operating environments of many FPGAbased embedded systems require flexible security that can be configured to minimize the impact on FPGA area and power consumption. In this paper, a s......
0次引用 0 0
Security extensions for integrity and confidentiality in embedded processors  
With current trends toward embedded computer systems' ubiquitous accessibility, connectivity, diversification, and proliferation, security becomes a critical issue in embedded computer systems design ......
Microprocessors and Microsystems  2009
0次引用 0 0
Design and Implementation of a Cryptographic Unit for Efficient, Secure and Trusted Execution of Cryptographic Algorithms  
Cryptographic algorithms, although being secure in theoretical construction, have many practical implementation challenges since they feature compute- and resource- intensive operations and handles se......
0次引用 0 0
Defending Against Attacks on Main Memory Persistence  
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such as passwords and keys ......
Asia-Pacific Computer Systems Architecture Conference  2008
1次引用 0 0
CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection  
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a tamper resistant envir......
Asia-Pacific Computer Systems Architecture Conference  2006
6次引用 0 0
Transparent code authentication at the processor level  
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need......
Iet Computers and Digital Techniques  2009
2次引用 0 0

1/3 第一页 上一页 1 2 3 下一页
Feedback
Feedback
Feedback
我想反馈:
排行榜