메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 74-83

A low-cost memory remapping scheme for address bus protection

Author keywords

Address bus leakage protection; Secure processor

Indexed keywords

ADDRESS BUS LEAKAGE PROTECTION; MEMORY TRAFFIC; REMOTE SERVERS; SECURE PROCESSORS;

EID: 34247169669     PISSN: 1089795X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1152154.1152169     Document Type: Conference Paper
Times cited : (7)

References (33)
  • 1
    • 34247169448 scopus 로고    scopus 로고
    • DS5002FP secure microprocessor chip data sheet
    • DS5002FP secure microprocessor chip data sheet.
  • 2
    • 34247118695 scopus 로고    scopus 로고
    • http://www.buyya.com/ecogrid.
  • 3
    • 34247137837 scopus 로고    scopus 로고
    • http://www.micron.com.
  • 4
    • 34247162634 scopus 로고    scopus 로고
    • http://www.modchip.com.
  • 5
    • 34247094190 scopus 로고    scopus 로고
    • 2.5-inch enterprise disc drives. Technology Paper, Feb 2005
    • 2.5-inch enterprise disc drives. Technology Paper, Feb 2005.
  • 6
    • 34247112734 scopus 로고    scopus 로고
    • IA-32 Intel Architecture Software Developer's Manual, 3A, Part 1, Jan 2006
    • IA-32 Intel Architecture Software Developer's Manual, Vol. 3A, Part 1. ftp://download.intel.com/design/Pentium4/manuals/25366818.pdf, Jan 2006.
  • 8
    • 79251578513 scopus 로고    scopus 로고
    • B. Barak, O. Goldreich, R. Impagliazzo, and etc. On the (im)possibility of obfuscating programs. In CRYPTO, pages 1-18.J, 2001.
    • B. Barak, O. Goldreich, R. Impagliazzo, and etc. On the (im)possibility of obfuscating programs. In CRYPTO, pages 1-18.J, 2001.
  • 9
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Technical Report 148, University of Auckland
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 10
    • 0035511096 scopus 로고    scopus 로고
    • High-Performance DRAMs in Workstation Environments
    • V. Cuppu, B. Jacob, B. Davis, and T. Mudge. High-Performance DRAMs in Workstation Environments. IEEE Trans. on Computer, 50(11):1133-1153, 2001.
    • (2001) IEEE Trans. on Computer , vol.50 , Issue.11 , pp. 1133-1153
    • Cuppu, V.1    Jacob, B.2    Davis, B.3    Mudge, T.4
  • 13
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious rams
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious rams. In The 19th Annual ACM Symposium on Theory of Computing, pages 182-194, 1987.
    • (1987) The 19th Annual ACM Symposium on Theory of Computing , pp. 182-194
    • Goldreich, O.1
  • 14
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • May
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. Journal of the ACM, 43(3):431-473, May 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 15
    • 0141890488 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
    • P. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In International Cryptology Conference, 1996.
    • (1996) International Cryptology Conference
    • Kocher, P.1
  • 16
    • 26444508871 scopus 로고    scopus 로고
    • The trustnol cryptoprocessor concept
    • Purdue University
    • M. G. Kuhn. The trustnol cryptoprocessor concept. Technical Report CS555 Report, Purdue University, 1997.
    • (1997) Technical Report CS555 Report
    • Kuhn, M.G.1
  • 17
    • 0032180824 scopus 로고    scopus 로고
    • Cipher instruction search attack on the bus-encryption security microcontroller ds5002fp
    • Oct
    • M. G. Kuhn. Cipher instruction search attack on the bus-encryption security microcontroller ds5002fp. IEEE Transactions on Computers, 47(10):1153-1157, Oct 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.10 , pp. 1153-1157
    • Kuhn, M.G.1
  • 19
    • 34247111796 scopus 로고    scopus 로고
    • C. McClure. Software reuse planning by way of domain analysis. Technical Paper, Extended Intelligence, Inc. http://www.reusability.com.
    • C. McClure. Software reuse planning by way of domain analysis. Technical Paper, Extended Intelligence, Inc. http://www.reusability.com.
  • 21
    • 34547261088 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of aes
    • February
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of aes. In RSA Conference, February 2006.
    • (2006) RSA Conference
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 22
    • 33646805500 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • C. Percival. Cache missing for fun and profit. In BSDCan 2005, 2005.
    • (2005) BSDCan 2005
    • Percival, C.1
  • 24
    • 3042629361 scopus 로고    scopus 로고
    • Tolerating late memory traps in dynamically scheduled processors
    • June
    • X. Qiu and M. Dubois. Tolerating late memory traps in dynamically scheduled processors. IEEE Transactions on Computers, 53(6):732-743, June 2004.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 732-743
    • Qiu, X.1    Dubois, M.2
  • 25
    • 22944434531 scopus 로고    scopus 로고
    • Moving address translation closer to memory in distributed shard-memory multiprocessors
    • July
    • X. Qiu and M. Dubois. Moving address translation closer to memory in distributed shard-memory multiprocessors. IEEE Transactions on Parallel and Distributed Systems, 16(7):612-623, July 2005.
    • (2005) IEEE Transactions on Parallel and Distributed Systems , vol.16 , Issue.7 , pp. 612-623
    • Qiu, X.1    Dubois, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.