메뉴 건너뛰기




Volumn 5, Issue 4, 2009, Pages

Making secure processors OS- and performance-friendly

Author keywords

Memory encryption; Memory integrity verification; Secure processor architectures; Virtualization

Indexed keywords

COMPUTER SECURITY; CRITICAL SYSTEMS; DIGITAL WORLD; INTERPROCESS COMMUNICATION; MEMORY ENCRYPTION; MEMORY INTEGRITY VERIFICATION; MERKLE TREES; MODE-BASED; MULTI-CORE SYSTEMS; PERFORMANCE ISSUES; PHYSICAL ATTACKS; QUANTITATIVE ANALYSIS; SECURE PROCESSOR ARCHITECTURES; SECURE PROCESSORS; SEED COMPOSITION; SINGLE-THREADED; UNIPROCESSOR SYSTEMS; VIRTUAL MEMORY; VIRTUALIZATION;

EID: 66149091931     PISSN: 15443566     EISSN: 15443973     Source Type: Journal    
DOI: 10.1145/1498690.1498691     Document Type: Article
Times cited : (17)

References (42)
  • 5
    • 66149149198 scopus 로고    scopus 로고
    • FIPS PUBLICATION 180-1. 1995. Secure Hash Standard. National Institute ofStandards and Technology, Federal Information Processing Standards.
    • FIPS PUBLICATION 180-1. 1995. Secure Hash Standard. National Institute ofStandards and Technology, Federal Information Processing Standards.
  • 6
    • 66149140769 scopus 로고    scopus 로고
    • FIPS PUBLICATION 197. 2001. Specification for the Advanced Encryption Standard (AES). National Institute of Standards and Technology, Federal Information Processing Standards.
    • FIPS PUBLICATION 197. 2001. Specification for the Advanced Encryption Standard (AES). National Institute of Standards and Technology, Federal Information Processing Standards.
  • 12
    • 85008023621 scopus 로고    scopus 로고
    • The Trusted PC: Skin-Deep Security
    • HUANG, A. 2002. The Trusted PC: Skin-Deep Security. IEEE Computer 35, 10, 103-105.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 103-105
    • HUANG, A.1
  • 16
    • 33751547821 scopus 로고    scopus 로고
    • Chiplock: Support for secure microarchitectures
    • KGIL, T., FALK, L., AND MUDGE, T. 2004. Chiplock: Support for secure microarchitectures. SIGARCH Comput. Architect. News 33, 1, 134-143.
    • (2004) SIGARCH Comput. Architect. News , vol.33 , Issue.1 , pp. 134-143
    • KGIL, T.1    FALK, L.2    MUDGE, T.3
  • 19
    • 34250372982 scopus 로고    scopus 로고
    • The coming wave of multithreaded chip multiprocessors
    • LAUDON, J. AND SPRACKLEN, L. 2007. The coming wave of multithreaded chip multiprocessors. Int. J. Parall. Program. 35, 3, 299-330.
    • (2007) Int. J. Parall. Program , vol.35 , Issue.3 , pp. 299-330
    • LAUDON, J.1    SPRACKLEN, L.2
  • 24
    • 66149141974 scopus 로고    scopus 로고
    • RENAU, J., TUCK, J., CEZE, L., STRAUSS, K., AND TORELLAS, J. 2004. SESC. http://sesc.sourceforge.net.
    • RENAU, J., TUCK, J., CEZE, L., STRAUSS, K., AND TORELLAS, J. 2004. SESC. http://sesc.sourceforge.net.
  • 27
    • 66149086697 scopus 로고    scopus 로고
    • SEMICONDUCTOR, M. 2007 (last modification). DS5002FP Secure Microprocessor Chip.
    • SEMICONDUCTOR, M. 2007 (last modification). DS5002FP Secure Microprocessor Chip.
  • 28
    • 40349095134 scopus 로고    scopus 로고
    • Authentication control point and its implications for secure processor design
    • IEEE Computer Society, Los Alamitos, CA
    • SHI, W. AND LEE, H.-H. S. 2006. Authentication control point and its implications for secure processor design. In Proceedings of the 39th Annual International Symposium on Microarchitecture. IEEE Computer Society, Los Alamitos, CA, 103-112.
    • (2006) Proceedings of the 39th Annual International Symposium on Microarchitecture , pp. 103-112
    • SHI, W.1    LEE, H.-H.S.2
  • 30
    • 27544453319 scopus 로고    scopus 로고
    • High efficiency counter mode security architecture via prediction and precomputation
    • SHI, W., LEE, H.-H. S., GHOSH, M., LU, C., AND BOLDYREVA, A. 2005. High efficiency counter mode security architecture via prediction and precomputation. SIGARCH Comput. Architect. News 33, 2, 14-24.
    • (2005) SIGARCH Comput. Architect. News , vol.33 , Issue.2 , pp. 14-24
    • SHI, W.1    LEE, H.-H.S.2    GHOSH, M.3    LU, C.4    BOLDYREVA, A.5
  • 31
    • 35348926637 scopus 로고    scopus 로고
    • Towards the issues in architectural support for protection of software execution
    • SHI, W., LEE, H.-H. S., LU, C., AND GHOSH, M. 2004. Towards the issues in architectural support for protection of software execution. SIGARCH Comput. Architect. News 33, 1, 6-15.
    • (2004) SIGARCH Comput. Architect. News , vol.33 , Issue.1 , pp. 6-15
    • SHI, W.1    LEE, H.-H.S.2    LU, C.3    GHOSH, M.4
  • 33
    • 84868939797 scopus 로고    scopus 로고
    • STANDARD PERFORMANCE EVALUATION CORPORATION
    • STANDARD PERFORMANCE EVALUATION CORPORATION. 2004. http://www.spec.org.
    • (2004)
  • 36
    • 84978382687 scopus 로고    scopus 로고
    • Memory resource management in vmware esx server
    • WALDSPURGER, C. A. 2002. Memory resource management in vmware esx server. SIGOPS Operat. Syst. Rev. 36, SI, 181-194.
    • (2002) SIGOPS Operat. Syst. Rev , vol.36 , Issue.SI , pp. 181-194
    • WALDSPURGER, C.A.1
  • 38
    • 66149135782 scopus 로고    scopus 로고
    • Improving cost, performance, and security of memory encryption and authentication
    • YAN, C., ROGERS, B., ENGLENDER, D., SOLIHIN, Y., AND PRVULOVIC, M. 2006. Improving cost, performance, and security of memory encryption and authentication. SIGARCH Comput. Architect. News 34, 2, 179-190.
    • (2006) SIGARCH Comput. Architect. News , vol.34 , Issue.2 , pp. 179-190
    • YAN, C.1    ROGERS, B.2    ENGLENDER, D.3    SOLIHIN, Y.4    PRVULOVIC, M.5
  • 42
    • 33845384414 scopus 로고    scopus 로고
    • Hide: An infrastructure for efficiently protecting information leakage on the address bus
    • ZHUANG, X., ZHANG, T., AND PANDE, S. 2004. Hide: An infrastructure for efficiently protecting information leakage on the address bus. SIGOPS Operat. Syst. Rev. 38, 5, 72-84.
    • (2004) SIGOPS Operat. Syst. Rev , vol.38 , Issue.5 , pp. 72-84
    • ZHUANG, X.1    ZHANG, T.2    PANDE, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.