메뉴 건너뛰기




Volumn , Issue , 2006, Pages 483-492

CryptoPage: An efficient secure architecture with memory encryption, integrity and information leakage protection

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTER ARCHITECTURE; DATA STORAGE EQUIPMENT; INFORMATION DISSEMINATION;

EID: 39049169674     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2006.21     Document Type: Conference Paper
Times cited : (48)

References (30)
  • 1
    • 0036469652 scopus 로고    scopus 로고
    • SIMPLESCALAR: An infrastructure for computer system modeling
    • Feb
    • T. Austin, E. Larson, and D. Ernst. SIMPLESCALAR: An infrastructure for computer system modeling. Computer, 35(2):59-67, Feb. 2002.
    • (2002) Computer , vol.35 , Issue.2 , pp. 59-67
    • Austin, T.1    Larson, E.2    Ernst, D.3
  • 3
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Springer-Verlag, editor, Advances in Cryptology, Asiacrypt 2000 Proceedings, of
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Springer-Verlag, editor, Advances in Cryptology - Asiacrypt 2000 Proceedings, volume 1976 of Lecture Notes in Computer Science, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 39049148471 scopus 로고    scopus 로고
    • CRYPTOPAGE -an architecture to run secure processes
    • École Nationale Supérieure des Télécommunications de Bretagne, DEA de l'Université de Rennes, June 2004
    • G. Duc. CRYPTOPAGE -an architecture to run secure processes. Diplôme d'Études Approfondies, École Nationale Supérieure des Télécommunications de Bretagne, DEA de l'Université de Rennes 1, June 2004. http://enstb.org/~gduc/dea/rapport/ rapport.pdf.
    • Diplôme d'Études Approfondies , vol.1
    • Duc, G.1
  • 8
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 9
    • 0034226001 scopus 로고    scopus 로고
    • measuring CPU performance in the new millennium
    • July
    • J. L. Henning. SPEC CPU2000: measuring CPU performance in the new millennium. IEEE Computer, 33(7):28-35, July 2000.
    • (2000) IEEE Computer , vol.33 , Issue.7 , pp. 28-35
    • Henning, J.L.1    CPU, S.P.E.C.2
  • 10
    • 0742293360 scopus 로고    scopus 로고
    • Keeping secrets in hardware: The Microsoft XBox (TM) case study
    • Technical Report AI Memo 2002-008, MIT, May
    • A. Huang. Keeping secrets in hardware: the Microsoft XBox (TM) case study. Technical Report AI Memo 2002-008, MIT, May 2002.
    • (2002)
    • Huang, A.1
  • 11
    • 0343387037 scopus 로고
    • Data cryptographic techniques -data integrity mechanism using a cryptographic check function employing a block cipher algorithm,
    • ISO/EC 9797
    • ISO/EC 9797. Data cryptographic techniques -data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1989.
    • (1989)
  • 12
    • 39049132912 scopus 로고    scopus 로고
    • CRYPTOPAGE-1 : Vers la fin du piratage informatique ?
    • Besançon, June
    • R. Keryell. CRYPTOPAGE-1 : vers la fin du piratage informatique ? In Symposium d'Architecture (SYMPA '6), pages 35-44, Besançon, June 2000.
    • (2000) Symposium d'Architecture (SYMPA '6 , pp. 35-44
    • Keryell, R.1
  • 16
    • 17544370316 scopus 로고    scopus 로고
    • D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), pages 168-177, Oct. 2000.
    • D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), pages 168-177, Oct. 2000.
  • 20
    • 84969346266 scopus 로고
    • A certified digital signature
    • Springer-Verlag New York, Inc
    • R. C. Merkle. A certified digital signature. In Proceedings on Advanced in Cryptology (CRYPTO '89), volume 435, pages 218-238. Springer-Verlag New York, Inc., 1989.
    • (1989) Proceedings on Advanced in Cryptology (CRYPTO '89 , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 21
    • 39049123248 scopus 로고    scopus 로고
    • Microsoft Corporation. NGSCB: Trusted Computing Base and Software Authentication, 2003. http://www.microsoft.com/resources/ngscb/ documents/ngscb.tcb.doc.
    • Microsoft Corporation. NGSCB: Trusted Computing Base and Software Authentication, 2003. http://www.microsoft.com/resources/ngscb/ documents/ngscb.tcb.doc.
  • 23
    • 0003928877 scopus 로고
    • NIST, May, Federal Information Processing Standards Publication 113
    • NIST. Computer data authentication, May 1985. Federal Information Processing Standards Publication 113.
    • (1985) Computer data authentication
  • 24
    • 0012983374 scopus 로고    scopus 로고
    • Recommendation for block cipher modes of operation
    • NIST, Dec
    • NIST. Recommendation for block cipher modes of operation, Dec. 2001. Special Publication 800-38A.
    • (2001) Special Publication 800-38A
  • 25
    • 27544453319 scopus 로고    scopus 로고
    • W. Shi, H.-H. S. Lee, M. Ghosh, C. Lu, and A. Boldyreva. High efficiency counter mode security architecture via prediction and precomputation. In Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA'05), pages 14-24. IEEE Computer Society, June 2005.
    • W. Shi, H.-H. S. Lee, M. Ghosh, C. Lu, and A. Boldyreva. High efficiency counter mode security architecture via prediction and precomputation. In Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA'05), pages 14-24. IEEE Computer Society, June 2005.
  • 27
    • 27544441530 scopus 로고    scopus 로고
    • G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas. Design and implementation of the AEGIS single-chip secure processor using physical random functions. In Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA '05), pages 25-36. IEEE Computer Society, June 2005.
    • G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas. Design and implementation of the AEGIS single-chip secure processor using physical random functions. In Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA '05), pages 25-36. IEEE Computer Society, June 2005.
  • 28
    • 39049140218 scopus 로고    scopus 로고
    • Trusted Computing Group, Mar
    • Trusted Computing Group, Mar. 2005. http://www.trustedcomputinggroup.org.
    • (2005)
  • 29
    • 33845900936 scopus 로고    scopus 로고
    • C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin. Improving cost, performance, and security of memory encryption and authentication. In Proceedings of the 33rd International Symposium on Computer Architecture (ISCA'06), pages 179-190. IEEE Computer Society, June 2006.
    • C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin. Improving cost, performance, and security of memory encryption and authentication. In Proceedings of the 33rd International Symposium on Computer Architecture (ISCA'06), pages 179-190. IEEE Computer Society, June 2006.
  • 30
    • 12344334769 scopus 로고    scopus 로고
    • X. Zhuang, T. Zhang, and S. Pande. HIDE: an infrastructure for efficiently protecting information leakage on the address bus. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI), pages 72-84. ACM Press, Oct. 2004.
    • X. Zhuang, T. Zhang, and S. Pande. HIDE: an infrastructure for efficiently protecting information leakage on the address bus. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI), pages 72-84. ACM Press, Oct. 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.