类 型
15 篇文献
 
Authentication Control Point and Its Implications For Secure Processor Design  
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing, secure mobile agent......
International Symposium on Microarchitecture  2006
11次引用 0 0
Efficient data protection for distributed shared memory multiprocessors  
Data security in computer systems has recently become an increasing concern, and hardware-based attacks have emerged. As a result, researchers have investigated hardware encryption and authentication ......
International Conference on Parallel Architectures and Compilation Techniques  2006
13次引用 0 0
SecureME: a hardware-software approach to full system security  
With computing increasingly becoming more dispersed, relying on mobile devices, distributed computing, cloud computing, etc. there is an increasing threat from adversaries obtaining physical access to......
International Conference on Supercomputing  2011
2次引用 0 0
IVEC: off-chip memory integrity protection for both security and reliability  
This paper proposes a unified off-chip memory integrity protection scheme, named IVEC. Today, a system needs two independent mechanisms in order to protect the memory integrity from both physical atta......
ACM Sigarch Computer Architecture News  2010
1次引用 0 0
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment  
Virtualization is fundamental to cloud computing because it allows multiple operating systems to run simultaneously on a physical machine. However, it also brings a range of security/privacy problems.......
Conference On Computing Frontiers  2013
0次引用 0 0
Accelerating memory decryption and authentication with frequent value prediction  
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have used memory block en......
Conference On Computing Frontiers  2007
0次引用 0 0
Towards fast hardware memory integrity checking with skewed Merkle trees  
Protection of a computer's memory's integrity is crucial in situations where physical attacks on the computer system are a threat. Such attacks can happen during physical break in into a data center o......
Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy  2014
0次引用 0 0
DynaPoMP: dynamic policy-driven memory protection for SPM-based embedded systems  
Today's embedded systems are often used to access, store, manipulate, and communicate sensitive data. Embedded system security risks are exacerbated by emerging trends (e.g., network connectivity, app......
Compilers, Architecture, and Synthesis for Embedded Systems  2011
0次引用 0 0
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors  
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private......
Computing Research Repository  2013
2次引用 0 0
A fast real-time memory authentication protocol  
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal hash function family......
Computer and Communications Security  2008
1次引用 0 0

1/2 第一页 上一页 1 2 下一页
Feedback
Feedback
Feedback
我想反馈:
排行榜