-
1
-
-
34247169448
-
-
DS5002FP secure microprocessor chip data sheet
-
DS5002FP secure microprocessor chip data sheet.
-
-
-
-
2
-
-
34247118695
-
-
http://www.buyya.com/ecogrid.
-
-
-
-
3
-
-
34247137837
-
-
http://www.micron.com.
-
-
-
-
4
-
-
34247162634
-
-
http://www.modchip.com.
-
-
-
-
5
-
-
34247094190
-
-
2.5-inch enterprise disc drives. Technology Paper, Feb 2005
-
2.5-inch enterprise disc drives. Technology Paper, Feb 2005.
-
-
-
-
6
-
-
34247112734
-
-
IA-32 Intel Architecture Software Developer's Manual, 3A, Part 1, Jan 2006
-
IA-32 Intel Architecture Software Developer's Manual, Vol. 3A, Part 1. ftp://download.intel.com/design/Pentium4/manuals/25366818.pdf, Jan 2006.
-
-
-
-
8
-
-
79251578513
-
-
B. Barak, O. Goldreich, R. Impagliazzo, and etc. On the (im)possibility of obfuscating programs. In CRYPTO, pages 1-18.J, 2001.
-
B. Barak, O. Goldreich, R. Impagliazzo, and etc. On the (im)possibility of obfuscating programs. In CRYPTO, pages 1-18.J, 2001.
-
-
-
-
9
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, University of Auckland
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
0035511096
-
High-Performance DRAMs in Workstation Environments
-
V. Cuppu, B. Jacob, B. Davis, and T. Mudge. High-Performance DRAMs in Workstation Environments. IEEE Trans. on Computer, 50(11):1133-1153, 2001.
-
(2001)
IEEE Trans. on Computer
, vol.50
, Issue.11
, pp. 1133-1153
-
-
Cuppu, V.1
Jacob, B.2
Davis, B.3
Mudge, T.4
-
11
-
-
0032687058
-
A Performance Comparison of Contemporary DRAM Architectures
-
V. Cuppu, B. L. Jacob, B. Davis, and T. N. Mudge. A Performance Comparison of Contemporary DRAM Architectures. In the 26th International symposium of Computer Architecture, pages 222-233, 1999.
-
(1999)
the 26th International symposium of Computer Architecture
, pp. 222-233
-
-
Cuppu, V.1
Jacob, B.L.2
Davis, B.3
Mudge, T.N.4
-
12
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and hash trees for efficient memory integrity verification. In The 9th International Symposium on High Performance Computer Architecture, pages 295-306, 2003.
-
(2003)
The 9th International Symposium on High Performance Computer Architecture
, pp. 295-306
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
van Dijk, M.4
Devadas, S.5
-
13
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious rams
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious rams. In The 19th Annual ACM Symposium on Theory of Computing, pages 182-194, 1987.
-
(1987)
The 19th Annual ACM Symposium on Theory of Computing
, pp. 182-194
-
-
Goldreich, O.1
-
14
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
May
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. Journal of the ACM, 43(3):431-473, May 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
15
-
-
0141890488
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
P. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In International Cryptology Conference, 1996.
-
(1996)
International Cryptology Conference
-
-
Kocher, P.1
-
16
-
-
26444508871
-
The trustnol cryptoprocessor concept
-
Purdue University
-
M. G. Kuhn. The trustnol cryptoprocessor concept. Technical Report CS555 Report, Purdue University, 1997.
-
(1997)
Technical Report CS555 Report
-
-
Kuhn, M.G.1
-
17
-
-
0032180824
-
Cipher instruction search attack on the bus-encryption security microcontroller ds5002fp
-
Oct
-
M. G. Kuhn. Cipher instruction search attack on the bus-encryption security microcontroller ds5002fp. IEEE Transactions on Computers, 47(10):1153-1157, Oct 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.10
, pp. 1153-1157
-
-
Kuhn, M.G.1
-
18
-
-
0034445599
-
Architectural Support for Copy and Tamper Resistant Software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 168-177, 2000.
-
(2000)
the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
19
-
-
34247111796
-
-
C. McClure. Software reuse planning by way of domain analysis. Technical Paper, Extended Intelligence, Inc. http://www.reusability.com.
-
C. McClure. Software reuse planning by way of domain analysis. Technical Paper, Extended Intelligence, Inc. http://www.reusability.com.
-
-
-
-
20
-
-
0034440975
-
MemorIES: A programmable, Real-time Hardware Emulation Tool for Multiprocessor Server Design
-
November
-
A. Nanda, K. S. Kwok-Ken Mak, R. K. Sahoo, V. Soundararajan, and T. B. Smith. MemorIES: A programmable, Real-time Hardware Emulation Tool for Multiprocessor Server Design. In The Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 37-48, November 2000.
-
(2000)
The Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 37-48
-
-
Nanda, A.1
Kwok-Ken Mak, K.S.2
Sahoo, R.K.3
Soundararajan, V.4
Smith, T.B.5
-
21
-
-
34547261088
-
Cache attacks and countermeasures: The case of aes
-
February
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of aes. In RSA Conference, February 2006.
-
(2006)
RSA Conference
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
22
-
-
33646805500
-
Cache missing for fun and profit
-
C. Percival. Cache missing for fun and profit. In BSDCan 2005, 2005.
-
(2005)
BSDCan 2005
-
-
Percival, C.1
-
24
-
-
3042629361
-
Tolerating late memory traps in dynamically scheduled processors
-
June
-
X. Qiu and M. Dubois. Tolerating late memory traps in dynamically scheduled processors. IEEE Transactions on Computers, 53(6):732-743, June 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 732-743
-
-
Qiu, X.1
Dubois, M.2
-
25
-
-
22944434531
-
Moving address translation closer to memory in distributed shard-memory multiprocessors
-
July
-
X. Qiu and M. Dubois. Moving address translation closer to memory in distributed shard-memory multiprocessors. IEEE Transactions on Parallel and Distributed Systems, 16(7):612-623, July 2005.
-
(2005)
IEEE Transactions on Parallel and Distributed Systems
, vol.16
, Issue.7
, pp. 612-623
-
-
Qiu, X.1
Dubois, M.2
-
26
-
-
27544453319
-
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation
-
W. Shi, H.-H. S. Lee, M. Ghosh, C. Lu, and A. Boldyreva. High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. In Proceedings of the 32nd International Symposium on Computer Architecture, pages 14-24, 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture
, pp. 14-24
-
-
Shi, W.1
Lee, H.-H.S.2
Ghosh, M.3
Lu, C.4
Boldyreva, A.5
-
27
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: architecture for tamper-evident and tamper-resistant processing. In the 17th International Conference on Supercomputing, pages 160-171, 2003.
-
(2003)
the 17th International Conference on Supercomputing
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
28
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. Efficient memory integrity verification and encryption for secure processors. In the 36th International Symposium on Microarchitecture, pages 339-350, 2003.
-
(2003)
the 36th International Symposium on Microarchitecture
, pp. 339-350
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
31
-
-
28444455956
-
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
-
Y. Zhang, L. Gao, J. Yang, X. Zhang, and R. Gupta. SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. In The 11th International Symposium on High-Performance Computer Architecture, pages 352-362, 2005.
-
(2005)
The 11th International Symposium on High-Performance Computer Architecture
, pp. 352-362
-
-
Zhang, Y.1
Gao, L.2
Yang, J.3
Zhang, X.4
Gupta, R.5
-
32
-
-
29144444415
-
Hardware Assisted Control Flow Obfuscation for Embedded Processors
-
X. Zhuang, T. Zhang, H.-H. S. Lee, and S. Pande. Hardware Assisted Control Flow Obfuscation for Embedded Processors. In International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, pages 292-302, 2004.
-
(2004)
International Conference on Compilers, Architecture, and Synthesis for Embedded Systems
, pp. 292-302
-
-
Zhuang, X.1
Zhang, T.2
Lee, H.-H.S.3
Pande, S.4
|