-
3
-
-
21644433634
-
Xen and the art of virtualization
-
ACM, New York
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAR, R., PRATT, I.,AND WARFIELD, A. 2003. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles. ACM, New York, 164-177.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
BARHAM, P.1
DRAGOVIC, B.2
FRASER, K.3
HAND, S.4
HARRIS, T.5
HO, A.6
NEUGEBAR, R.7
PRATT, I.8
WARFIELD, A.9
-
4
-
-
0033722744
-
Piranha: A scalable architecture based on single-chip multiprocessing
-
ACM, New York
-
BARROSO, L. A., GHARACHORLOO, K., MCNAMARA, R., NOWATZYK, A., QADEER, S., SANO, B., SMITH, S., STETS, R., AND VERGHESE, B. 2000. Piranha: A scalable architecture based on single-chip multiprocessing. In Proceedings of the 27th International Symposium on Computer Architecture. ACM, New York, 282-293.
-
(2000)
Proceedings of the 27th International Symposium on Computer Architecture
, pp. 282-293
-
-
BARROSO, L.A.1
GHARACHORLOO, K.2
MCNAMARA, R.3
NOWATZYK, A.4
QADEER, S.5
SANO, B.6
SMITH, S.7
STETS, R.8
VERGHESE, B.9
-
5
-
-
66149149198
-
-
FIPS PUBLICATION 180-1. 1995. Secure Hash Standard. National Institute ofStandards and Technology, Federal Information Processing Standards.
-
FIPS PUBLICATION 180-1. 1995. Secure Hash Standard. National Institute ofStandards and Technology, Federal Information Processing Standards.
-
-
-
-
6
-
-
66149140769
-
-
FIPS PUBLICATION 197. 2001. Specification for the Advanced Encryption Standard (AES). National Institute of Standards and Technology, Federal Information Processing Standards.
-
FIPS PUBLICATION 197. 2001. Specification for the Advanced Encryption Standard (AES). National Institute of Standards and Technology, Federal Information Processing Standards.
-
-
-
-
7
-
-
34247169669
-
A low-cost memory remapping scheme for address bus protection
-
ACM, New York
-
GAO, L., YANG, J., CHROBAK, M., ZHANG, Y., NGUYEN, S., AND LEE, H.-H. S. 2006. A low-cost memory remapping scheme for address bus protection. InProceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques. ACM, New York, 74-83.
-
(2006)
Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques
, pp. 74-83
-
-
GAO, L.1
YANG, J.2
CHROBAK, M.3
ZHANG, Y.4
NGUYEN, S.5
LEE, H.-H.S.6
-
9
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
IEEE Computer Society, Los Alamitos, CA
-
GASSEND, B., SUH, G. E., CLARKE, D., VAN DIJK, M., AND DEVADAS, S. 2003. Caches and hash trees for efficient memory integrity verification. In Proceedings of the 9th International Symposium on High Performance Computer Architecture. IEEE Computer Society, Los Alamitos, CA, 295.
-
(2003)
Proceedings of the 9th International Symposium on High Performance Computer Architecture
, pp. 295
-
-
GASSEND, B.1
SUH, G.E.2
CLARKE, D.3
VAN DIJK, M.4
DEVADAS, S.5
-
10
-
-
84889019266
-
Enhancing security in the memory management unit
-
IEEE Computer Society, Los Alamitos, CA
-
GILMONT, T., LEGAT, J.-D., AND QUISQUATER, J.-J. 1999. Enhancing security in the memory management unit. In Proceedings of the 25th EuroMicro Conference. IEEE Computer Society, Los Alamitos, CA, 449-456.
-
(1999)
Proceedings of the 25th EuroMicro Conference
, pp. 449-456
-
-
GILMONT, T.1
LEGAT, J.-D.2
QUISQUATER, J.-J.3
-
12
-
-
85008023621
-
The Trusted PC: Skin-Deep Security
-
HUANG, A. 2002. The Trusted PC: Skin-Deep Security. IEEE Computer 35, 10, 103-105.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 103-105
-
-
HUANG, A.1
-
16
-
-
33751547821
-
Chiplock: Support for secure microarchitectures
-
KGIL, T., FALK, L., AND MUDGE, T. 2004. Chiplock: Support for secure microarchitectures. SIGARCH Comput. Architect. News 33, 1, 134-143.
-
(2004)
SIGARCH Comput. Architect. News
, vol.33
, Issue.1
, pp. 134-143
-
-
KGIL, T.1
FALK, L.2
MUDGE, T.3
-
19
-
-
34250372982
-
The coming wave of multithreaded chip multiprocessors
-
LAUDON, J. AND SPRACKLEN, L. 2007. The coming wave of multithreaded chip multiprocessors. Int. J. Parall. Program. 35, 3, 299-330.
-
(2007)
Int. J. Parall. Program
, vol.35
, Issue.3
, pp. 299-330
-
-
LAUDON, J.1
SPRACKLEN, L.2
-
20
-
-
0037810695
-
Specifying and verifying hardware for tamper-resistant software
-
IEEE Computer Society, Washington, DC
-
LIE, D., MITCHELL, J., THEKKATH, C. A., AND HOROWITZ, M. 2003. Specifying and verifying hardware for tamper-resistant software. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, 166.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 166
-
-
LIE, D.1
MITCHELL, J.2
THEKKATH, C.A.3
HOROWITZ, M.4
-
21
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
ACM, New York
-
LIE, D., THEKKATH, C. A., MITCHELL, M., LINCOLN, P., BONEH, D., MITCHELL, J., AND HOROWITZ, M. 2000. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems. ACM, New York, 168-177.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
LIE, D.1
THEKKATH, C.A.2
MITCHELL, M.3
LINCOLN, P.4
BONEH, D.5
MITCHELL, J.6
HOROWITZ, M.7
-
23
-
-
17044375510
-
The case for a single-chip multiprocessor
-
OLUKOTUN, K., NAYFEH, B. A., HAMMOND, L., WILSON, K., AND CHANG, K.-Y. 1996. The case for a single-chip multiprocessor. SIGOPS Operat. Syst. Rev. 30, 5, 2-11.
-
(1996)
SIGOPS Operat. Syst. Rev
, vol.30
, Issue.5
, pp. 2-11
-
-
OLUKOTUN, K.1
NAYFEH, B.A.2
HAMMOND, L.3
WILSON, K.4
CHANG, K.-Y.5
-
24
-
-
66149141974
-
-
RENAU, J., TUCK, J., CEZE, L., STRAUSS, K., AND TORELLAS, J. 2004. SESC. http://sesc.sourceforge.net.
-
RENAU, J., TUCK, J., CEZE, L., STRAUSS, K., AND TORELLAS, J. 2004. SESC. http://sesc.sourceforge.net.
-
-
-
-
25
-
-
47349124111
-
-
Computer Society, Los Alamitos, CA
-
ROGERS, B., CHHABRA S., SOLIHIN, Y. AND PRVULOVIC, M. 2007. Using address independent seed encryption and bonsai merkle trees to make secure processors os- and performance- friendly In Proceedings of the 40th International Symposium on Microarchitecture. IEEE Computer Society, Los Alamitos, CA, 183-196.
-
(2007)
Using address independent seed encryption and bonsai merkle trees to make secure processors os- and performance- friendly In Proceedings of the 40th International Symposium on Microarchitecture. IEEE
, pp. 183-196
-
-
ROGERS, B.1
CHHABRA, S.2
SOLIHIN, Y.3
PRVULOVIC, M.4
-
26
-
-
34247118899
-
Efficient data protection for distributed shared memory multiprocessors
-
ACM, New York
-
ROGERS, B., SOLIHIN, Y., AND PRVULOVIC, M. 2006. Efficient data protection for distributed shared memory multiprocessors. In Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques. ACM, New York, 84-94.
-
(2006)
Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques
, pp. 84-94
-
-
ROGERS, B.1
SOLIHIN, Y.2
PRVULOVIC, M.3
-
27
-
-
66149086697
-
-
SEMICONDUCTOR, M. 2007 (last modification). DS5002FP Secure Microprocessor Chip.
-
SEMICONDUCTOR, M. 2007 (last modification). DS5002FP Secure Microprocessor Chip.
-
-
-
-
28
-
-
40349095134
-
Authentication control point and its implications for secure processor design
-
IEEE Computer Society, Los Alamitos, CA
-
SHI, W. AND LEE, H.-H. S. 2006. Authentication control point and its implications for secure processor design. In Proceedings of the 39th Annual International Symposium on Microarchitecture. IEEE Computer Society, Los Alamitos, CA, 103-112.
-
(2006)
Proceedings of the 39th Annual International Symposium on Microarchitecture
, pp. 103-112
-
-
SHI, W.1
LEE, H.-H.S.2
-
29
-
-
10444227999
-
Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems
-
IEEE Computer Society, Los Alamitos, CA, DC
-
SHI, W., LEE, H.-H. S., GHOSH, M., AND LU, C. 2004. Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems. In Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques. IEEE Computer Society, Los Alamitos, CA, DC, 123-134.
-
(2004)
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques
, pp. 123-134
-
-
SHI, W.1
LEE, H.-H.S.2
GHOSH, M.3
LU, C.4
-
30
-
-
27544453319
-
High efficiency counter mode security architecture via prediction and precomputation
-
SHI, W., LEE, H.-H. S., GHOSH, M., LU, C., AND BOLDYREVA, A. 2005. High efficiency counter mode security architecture via prediction and precomputation. SIGARCH Comput. Architect. News 33, 2, 14-24.
-
(2005)
SIGARCH Comput. Architect. News
, vol.33
, Issue.2
, pp. 14-24
-
-
SHI, W.1
LEE, H.-H.S.2
GHOSH, M.3
LU, C.4
BOLDYREVA, A.5
-
31
-
-
35348926637
-
Towards the issues in architectural support for protection of software execution
-
SHI, W., LEE, H.-H. S., LU, C., AND GHOSH, M. 2004. Towards the issues in architectural support for protection of software execution. SIGARCH Comput. Architect. News 33, 1, 6-15.
-
(2004)
SIGARCH Comput. Architect. News
, vol.33
, Issue.1
, pp. 6-15
-
-
SHI, W.1
LEE, H.-H.S.2
LU, C.3
GHOSH, M.4
-
32
-
-
25844437046
-
Power5 system microarchitecture
-
SINHAROY, B., KALLA, R. N., TENDLER, J. M., EICKEMEYER, R. J., AND JOYNER, J. B. 2005. Power5 system microarchitecture. IBM J. Res. Dev. 49, 4/5, 505-521.
-
(2005)
IBM J. Res. Dev
, vol.49
, Issue.4-5
, pp. 505-521
-
-
SINHAROY, B.1
KALLA, R.N.2
TENDLER, J.M.3
EICKEMEYER, R.J.4
JOYNER, J.B.5
-
33
-
-
84868939797
-
-
STANDARD PERFORMANCE EVALUATION CORPORATION
-
STANDARD PERFORMANCE EVALUATION CORPORATION. 2004. http://www.spec.org.
-
(2004)
-
-
-
34
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
ACM, New York
-
SUH, G. E., CLARKE, D., GASSEND, B., VAN DIJK, M., AND DEVADAS, S. 2003a. Aegis: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th International Conference on Supercomputing. ACM, New York, 160-171.
-
(2003)
Proceedings of the 17th International Conference on Supercomputing
, pp. 160-171
-
-
SUH, G.E.1
CLARKE, D.2
GASSEND, B.3
VAN DIJK, M.4
DEVADAS, S.5
-
35
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
IEEE Computer Society, Los Alamitos, CA
-
SUH, G. E., CLARKE, D., GASSEND, B., VAN DIJK, M., AND DEVADAS, S. 2003b. Efficient memory integrity verification and encryption for secure processors. In Proceedings of the 36th International Symposium on Microarchitecture. IEEE Computer Society, Los Alamitos, CA, 339.
-
(2003)
Proceedings of the 36th International Symposium on Microarchitecture
, pp. 339
-
-
SUH, G.E.1
CLARKE, D.2
GASSEND, B.3
VAN DIJK, M.4
DEVADAS, S.5
-
36
-
-
84978382687
-
Memory resource management in vmware esx server
-
WALDSPURGER, C. A. 2002. Memory resource management in vmware esx server. SIGOPS Operat. Syst. Rev. 36, SI, 181-194.
-
(2002)
SIGOPS Operat. Syst. Rev
, vol.36
, Issue.SI
, pp. 181-194
-
-
WALDSPURGER, C.A.1
-
38
-
-
66149135782
-
Improving cost, performance, and security of memory encryption and authentication
-
YAN, C., ROGERS, B., ENGLENDER, D., SOLIHIN, Y., AND PRVULOVIC, M. 2006. Improving cost, performance, and security of memory encryption and authentication. SIGARCH Comput. Architect. News 34, 2, 179-190.
-
(2006)
SIGARCH Comput. Architect. News
, vol.34
, Issue.2
, pp. 179-190
-
-
YAN, C.1
ROGERS, B.2
ENGLENDER, D.3
SOLIHIN, Y.4
PRVULOVIC, M.5
-
39
-
-
84944392287
-
Fast secure processor for inhibiting software piracy and tampering
-
IEEE Computer Society, Washington, DC
-
YANG, J., ZHANG, Y., AND GAO, L. 2003. Fast secure processor for inhibiting software piracy and tampering. In Proceedings of the 36th Annual International Symposium on Microarchitecture. IEEE Computer Society, Washington, DC, 351.
-
(2003)
Proceedings of the 36th Annual International Symposium on Microarchitecture
, pp. 351
-
-
YANG, J.1
ZHANG, Y.2
GAO, L.3
-
40
-
-
28444455956
-
Senss: Security enhancement to symmetric shared memory multiprocessors
-
IEEE Computer Society, Los Alamitos, CA
-
ZHANG, Y., GAO, L., YANG, J., ZHANG, X., AND GUPTA, R. 2005. Senss: Security enhancement to symmetric shared memory multiprocessors. In Proceedings of the 11th International Symposium on High-Performance Computer Architecture. IEEE Computer Society, Los Alamitos, CA, 352-362.
-
(2005)
Proceedings of the 11th International Symposium on High-Performance Computer Architecture
, pp. 352-362
-
-
ZHANG, Y.1
GAO, L.2
YANG, J.3
ZHANG, X.4
GUPTA, R.5
-
41
-
-
29144444415
-
Hardware assisted control flow obfus-cation for embedded processors
-
ACM, New York
-
ZHUANG, X., ZHANG, T., LEE, H.-H. S., AND PANDE, S. 2004. Hardware assisted control flow obfus-cation for embedded processors. In Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems. ACM, New York, 292-302.
-
(2004)
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems
, pp. 292-302
-
-
ZHUANG, X.1
ZHANG, T.2
LEE, H.-H.S.3
PANDE, S.4
-
42
-
-
33845384414
-
Hide: An infrastructure for efficiently protecting information leakage on the address bus
-
ZHUANG, X., ZHANG, T., AND PANDE, S. 2004. Hide: An infrastructure for efficiently protecting information leakage on the address bus. SIGOPS Operat. Syst. Rev. 38, 5, 72-84.
-
(2004)
SIGOPS Operat. Syst. Rev
, vol.38
, Issue.5
, pp. 72-84
-
-
ZHUANG, X.1
ZHANG, T.2
PANDE, S.3
|