메뉴 건너뛰기




Volumn , Issue , 2004, Pages 72-84

HIDE: An infrastructure for efficiently protecting information leakage on the address bus

Author keywords

Address Bus Leakage Protection; Secure Processor

Indexed keywords

ADDRESS BUS; HARDWARE SUPPORT FOR LEAKAGE IMMUNE DYNAMIC EXECUTION (HIDE); LEAKAGE PROTECTION; SECURE PROCESSORS;

EID: 12844260675     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (80)

References (25)
  • 7
    • 0032180824 scopus 로고    scopus 로고
    • Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
    • M.G.Kuhn, "Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP," IEEE Transaction on Computers, Vol.47, No.10, pp.1153-1157, 1998.
    • (1998) IEEE Transaction on Computers , vol.47 , Issue.10 , pp. 1153-1157
    • Kuhn, M.G.1
  • 8
    • 0038650645 scopus 로고    scopus 로고
    • The TrustNo 1 cryptoprocessor concept
    • Purdue Univ.
    • M.Kuhn, "The TrustNo 1 Cryptoprocessor Concept," CS555 Report, Purdue Univ. 1997.
    • (1997) CS555 Report
    • Kuhn, M.1
  • 10
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O.Goldreich, R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," Journal of the ACM, Vol.43, No.3, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3
    • Goldreich, O.1    Ostrovsky, R.2
  • 11
    • 12844286476 scopus 로고    scopus 로고
    • DS5002FP secure microprocessor chip data sheet
    • "DS5002FP secure microprocessor chip data sheet," Dallas Semiconductor.
    • Dallas Semiconductor
  • 12
    • 0016870630 scopus 로고
    • An algorithm for subgraph isomorphism
    • J.R.Ullman, "An Algorithm for subgraph Isomorphism," Journal of the ACM, Vol.23, pp.31-42, 1976.
    • (1976) Journal of the ACM , vol.23 , pp. 31-42
    • Ullman, J.R.1
  • 13
    • 84860082756 scopus 로고    scopus 로고
    • VFLib Graph Matching Library, http://amalfi.dis.unina.it/graph/db/vflib- 2.0/doc/vflib-1.html
  • 14
    • 0141890488 scopus 로고    scopus 로고
    • Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems
    • P.C.Kocher, "Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems," International Cryptology Conference, 1996.
    • (1996) International Cryptology Conference
    • Kocher, P.C.1
  • 17
    • 0003465202 scopus 로고    scopus 로고
    • The SimpleScalar tool set version 2.0
    • Univ. of Wisconsin-Madison, May
    • D.Burger, T.M.Austin. "The SimpleScalar Tool Set Version 2.0," TR. 1342, Univ. of Wisconsin-Madison, May 1997.
    • (1997) TR , vol.1342
    • Burger, D.1    Austin, T.M.2
  • 21
    • 12344287059 scopus 로고    scopus 로고
    • Keeping secrets in hardware: The Microsoft Xbox (TM) case study
    • May 26
    • A.Huang, "Keeping Secrets in Hardware: the Microsoft Xbox (TM) Case Study," MIT TR. AIM-2002-008, May 26, 2002.
    • (2002) MIT TR , vol.AIM-2002-008
    • Huang, A.1
  • 22
    • 84860051594 scopus 로고    scopus 로고
    • Software reuse planning by way of domain analysis
    • Technical Paper
    • C. McClure, "Software Reuse Planning by Way of Domain Analysis," Technical Paper, Extended Intelligence, Inc. http://www.reusability.com.
    • Extended Intelligence, Inc.
    • McClure, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.