-
1
-
-
77950965890
-
-
americanxboxmodchips.com, http://www.americanxboxmodchips.com/.
-
-
-
-
2
-
-
77950982884
-
-
http://www.modchip.com, 2005.
-
-
-
-
3
-
-
77950979113
-
-
mod-chip.com http://www.mod-chip.com/.
-
-
-
-
4
-
-
77950984622
-
-
modchipoutlet.com http://modchipoutlet.com/.
-
-
-
-
5
-
-
77950992693
-
-
modchipstore.com http://modchipstore.com./
-
-
-
-
6
-
-
77951012647
-
-
wii-modchips.com http://wii-modchips.com/.
-
-
-
-
7
-
-
0032180824
-
Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
-
Oct
-
M. G. Kuhn, "Cipher Instruction Search. Attack on the Bus-Encryption. Security Microcontroller DS5002FP," IEEE Transactions on Computers, vol.Oct, no.10, 1998.
-
(1998)
IEEE Transactions on Computers
, Issue.10
-
-
Kuhn, M.G.1
-
8
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
B. Gassend, G. Suh, D. Clarke, M. Dijk, and S. Devadas, "Caches and Hash Trees for Efficient Memory Integrity Verification," in Proc. of the 9th International Symposium on High Performance Computer Architecture, 2003.
-
(2003)
Proc. of the 9th International Symposium on High Performance Computer Architecture
-
-
Gassend, B.1
Suh, G.2
Clarke, D.3
Dijk, M.4
Devadas, S.5
-
11
-
-
4444322842
-
Specifying and verifying hardware for tamper-resistant software
-
D. Lie, J. Mitchell, C. Thekkath, and. M. Horowitz, "Specifying and Verifying Hardware for Tamper-Resistant Software," in. Proc of the 2003 IEEE Symposium on Security and Privacy, 2003.
-
(2003)
Proc of the 2003 IEEE Symposium on Security and Privacy
-
-
Lie, D.1
Mitchell, J.2
Thekkath, C.3
Horowitz, M.4
-
12
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell; P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," in Proc. of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000.
-
(2000)
Proc. of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
13
-
-
47349124111
-
Using address independent seed encryption, and bonsai merkle trees to make secure processors OS- and performance-friendly
-
B. Rogers, S. Chhabra, Y. Solihin, and M. Prvulovic, "Using Address Independent Seed Encryption, and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly," in Proc. of the 36th Annual International Symposium on Microarchitecture, 2007.
-
(2007)
Proc. of the 36th Annual International Symposium on Microarchitecture
-
-
Rogers, B.1
Chhabra, S.2
Solihin, Y.3
Prvulovic, M.4
-
14
-
-
10444227999
-
Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems
-
W. Shi, H.-H. Lee, M. Ghosh, and C. Lu, "Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems," in Proc. of the 13th International Conference on Parallel Architectures and Compilation Techniques, 2004.
-
(2004)
Proc. of the 13th International Conference on Parallel Architectures and Compilation Techniques
-
-
Shi, W.1
Lee, H.-H.2
Ghosh, M.3
Lu, C.4
-
15
-
-
27544453319
-
High efficiency counter mode security architecture via prediction and precomputation
-
W. Shi, H.-H. Lee, M. Ghosh, C. Lu, and A. Boldyreva, "High Efficiency Counter Mode Security Architecture via Prediction and Precomputation," in Proc. of the 32nd International Symposium on. Computer Architecture, 2005.
-
(2005)
Proc. of the 32nd International Symposium On. Computer Architecture
-
-
Shi, W.1
Lee, H.-H.2
Ghosh, M.3
Lu, C.4
Boldyreva, A.5
-
16
-
-
27544504952
-
Towards the issues in architectural support for protection of software execution
-
W. Shi, H.-H. Lee, C. Lu, and M. Ghosh, "Towards the Issues in Architectural Support for Protection of Software Execution," in Proc. of the Workshop on Architectural Support for Security and Anti-virus, 2004.
-
(2004)
Proc. of the Workshop on Architectural Support for Security and Anti-virus
-
-
Shi, W.1
Lee, H.-H.2
Lu, C.3
Ghosh, M.4
-
17
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing," in Proc. of the 17th International Conference on Supercomputlng, 2003.
-
(2003)
Proc. of the 17th International Conference on Supercomputlng
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
19
-
-
33845900936
-
Improving cost, performance, and security of memory encryption, and authentication
-
C. Yan, B. Rogers, D. Englender, Y. Solihin, and M. Prvulovic, "Improving Cost, Performance, and Security of Memory Encryption, and Authentication,'" in Proc. of the International Symposium on Computer Architecture, 2006.
-
(2006)
Proc. of the International Symposium on Computer Architecture
-
-
Yan, C.1
Rogers, B.2
Englender, D.3
Solihin, Y.4
Prvulovic, M.5
-
23
-
-
84958776015
-
Personal secure booting
-
N. Itoi, W. A. Arbaugh, S. Pollack, and D. M. Reeves, "Personal Secure Booting," in Proc. of the Sixth Australian Conference on Information Security and Privacy, 2001.
-
(2001)
Proc. of the Sixth Australian Conference on Information Security and Privacy
-
-
Itoi, N.1
Arbaugh, W.A.2
Pollack, S.3
Reeves, D.M.4
-
24
-
-
77951983950
-
-
ARM
-
ARM, "ARM TrustZone," http://wwwMrm.com/products/esd/trustzpne- home.html, 2004.
-
(2004)
ARM TrustZone
-
-
-
25
-
-
77950973173
-
Maxim/dallas semiconductor
-
(last modification).
-
Maxim/Dallas Semiconductor, "DS5002FP Secure Microprocessor Chip," http://www.maxlm-ic.com/qulck.view2.cfm/qvjfk/2949, 2007 (last modification).
-
(2007)
DS5002FP Secure Microprocessor Chip
-
-
-
27
-
-
77951011249
-
-
Panda.Labs
-
Panda.Labs, "Quarterly Report PandaLabs," pandalabs. pandasecurity.com/hlogs/images/PandaLahs/2008/04/Ol/Quarterly.Report. PandaLabs-Q1-2008.pdf, 2008.
-
(2008)
Quarterly Report PandaLabs
-
-
-
28
-
-
79959580581
-
-
IBM Corporation
-
IBM Corporation, "The Cell Broadband En- 1 gine processor security architecture," http://www- 128.ibm.com/developerworks/power/library/pa-cel. lsecur.ity/ http://128.ibm.com/developerworks/power/library/pa-cel.lsecur.ity/, 2006.
-
(2006)
The Cell Broadband En- 1 Gine Processor Security Architecture
-
-
-
29
-
-
77951004616
-
-
OZMODCHIPS
-
OZMODCHIPS, "Sony Playstation 3 modchips," http://www.ozmodehi- ps.com/ps3-playstation-3-moclchi.p-p-68.ht.ml
-
(2008)
Sony Playstation 3 Modchips
-
-
-
30
-
-
77950977902
-
-
FIPS Publication. 1.97
-
FIPS Publication. 1.97, "RSA Cryptography Standard," http://www.rsa. com/rsalabs/node.asp?id-2125, 1993.
-
(1993)
RSA Cryptography Standard
-
-
-
31
-
-
0003629991
-
Secure hash standard
-
FIPS Publication 180-1, National Institute of Standards and Technology
-
FIPS Publication 180-1, "Secure Hash Standard," National Institute of Standards and Technology, Federal Information Processing Standards, 1995.
-
(1995)
Federal Information Processing Standards
-
-
-
32
-
-
77950987679
-
-
Microsoft, "Windows Logo Program," http://www.microsoft.com/ whdc/winlogo/default.mspx.
-
Windows Logo Program
-
-
-
33
-
-
0003508562
-
Digital signature standard (AES)
-
FIPS Publication 186, National Institute of Standards and Technology
-
FIPS Publication 186, "Digital Signature Standard (AES)," National Institute of Standards and Technology, Federal Information Processing Standards, 1994.
-
(1994)
Federal Information Processing Standards
-
-
-
37
-
-
77950999668
-
-
MOSIS
-
MOSIS, http://www.mosis.com/.
-
-
-
-
39
-
-
77950995651
-
-
J. Renau et al, "SESC," http://sesc.sourceforge.net, 2004.
-
(2004)
-
-
Renau, J.1
-
42
-
-
77950997350
-
-
W. Dai, Crypto++ version 5.5.1
-
W. Dai, "Crypto++ version 5.5.1," http://www.cryptopp.com/, 1995.
-
(1995)
-
-
|