메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Scalable architectural support for trusted software

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER HARDWARE; SUPERCOMPUTERS;

EID: 77952579228     PISSN: 15300897     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/hpca.2010.5416657     Document Type: Conference Paper
Times cited : (152)

References (37)
  • 1
    • 34547461216 scopus 로고    scopus 로고
    • A comparison of software and hardware techniques for x86 virtualization
    • K. Adams et al. A comparison of software and hardware techniques for x86 virtualization, in Proc. of ASPLOS06, Oct. 2006.
    • Proc. of ASPLOS06, Oct. 2006
    • Adams, K.1
  • 3
    • 77952558128 scopus 로고    scopus 로고
    • AMD, AMD Whitepaper Revision 1.0, July
    • AMD, AMD-V Nested Paging. AMD Whitepaper Revision 1.0, July 2008.
    • (2008) AMD-V Nested Paging
  • 4
    • 54249153664 scopus 로고    scopus 로고
    • Technical Report HPL-2007-2069, Hewlett-Packard Development Company, L.P., April
    • M.J. Anderson et al. Towards Trustworthy Virtualisation Environments. Technical Report HPL-2007-2069, Hewlett-Packard Development Company, L.P., April 2007.
    • (2007) Towards Trustworthy Virtualisation Environments
    • Anderson, M.J.1
  • 8
    • 77952563187 scopus 로고    scopus 로고
    • The Reduced Address Space (RAS) for Application Memory Authentication
    • D. Champagne et al., The Reduced Address Space (RAS) for Application Memory Authentication, In Proc. of the 11th ISC'08, Sept. 2008.
    • Proc. of the 11th ISC'08, Sept. 2008
    • Champagne, D.1
  • 9
    • 67650799825 scopus 로고    scopus 로고
    • Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems
    • X. Chen et al. Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, In Proc. of ASPLOS08, March 2008.
    • Proc. of ASPLOS08, March 2008
    • Chen, X.1
  • 11
    • 70249085218 scopus 로고    scopus 로고
    • A Hypervisor-Based System for Protecting Software Runtime Memory and Persistent Storage
    • P. Dewan et al. A Hypervisor-Based System for Protecting Software Runtime Memory and Persistent Storage, SSSS'08, April 2008.
    • SSSS'08, April 2008
    • Dewan, P.1
  • 12
    • 42549167254 scopus 로고    scopus 로고
    • Hardware-rooted Trust for Secure Key Management and Transient Trust
    • J. Dwoskin and R.B. Lee. Hardware-rooted Trust for Secure Key Management and Transient Trust, Proc. of ACM CCS'07, Oct. 2007.
    • Proc. of ACM CCS'07, Oct. 2007
    • Dwoskin, J.1    Lee, R.B.2
  • 15
    • 4444318660 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • T. Garfinkel et al., Terra: A virtual machine-based platform for trusted computing, in Proc. of SOSP, Oct. 2003.
    • Proc. of SOSP, Oct. 2003
    • Garfinkel, T.1
  • 16
    • 0037636094 scopus 로고    scopus 로고
    • Caches and Merkle Trees for Efficient Memory Authentication
    • Feb.
    • B. Gassend et al., Caches and Merkle Trees for Efficient Memory Authentication, Proc. of HPCA 2003, Feb. 2003.
    • (2003) Proc. of HPCA , vol.2003
    • Gassend, B.1
  • 17
    • 85077701725 scopus 로고    scopus 로고
    • Lest We Remember: Cold Boot Attacks on Encryption Keys
    • July/August
    • J. A. Halderman et al. Lest We Remember: Cold Boot Attacks on Encryption Keys. In Proc. of USENIX Security, July/August 2008.
    • (2008) Proc. of USENIX Security
    • Halderman, J.A.1
  • 18
    • 77952561822 scopus 로고    scopus 로고
    • Intel Virtualization Technology: Hardware Support for Efficient Virtualization
    • Intel, Aug.
    • Intel, Intel Virtualization Technology: Hardware Support for Efficient Virtualization, Intel Technology Journal, Aug. 2006.
    • (2006) Intel Technology Journal
  • 20
    • 77952556837 scopus 로고    scopus 로고
    • Vault: Practical Uses of Virtual Machines for Protection of Sensitive User Data
    • P. Kwan et al. Vault: Practical Uses of Virtual Machines for Protection of Sensitive User Data. In Proc. of ISPEC 2007, May 2007.
    • Proc. of ISPEC 2007, May 2007
    • Kwan, P.1
  • 21
    • 77952562617 scopus 로고    scopus 로고
    • UltraSPARC T1: Architecture and Physical Design of a 32-threaded General Purpose CPU
    • J. Laudon. UltraSPARC T1: Architecture and Physical Design of a 32-threaded General Purpose CPU, In Proc. of IEEE ISSCC, Feb. 2006.
    • Proc. of IEEE ISSCC, Feb. 2006
    • Laudon, J.1
  • 22
    • 85088734254 scopus 로고    scopus 로고
    • Architecture for Protecting Critical Secrets in Microprocessors
    • R. B. Lee et al. "Architecture for Protecting Critical Secrets in Microprocessors," Proc. of ISCA 2005, June 2005.
    • Proc. of ISCA 2005, June 2005
    • Lee, R.B.1
  • 23
    • 0034445599 scopus 로고    scopus 로고
    • Architectural Support for Copy and Tamper Resistant Software
    • D. Lie et al. Architectural Support for Copy and Tamper Resistant Software, Proc. of ASPLOS IX, 2000.
    • Proc. of ASPLOS IX, 2000
    • Lie, D.1
  • 26
    • 55149108173 scopus 로고    scopus 로고
    • Flicker: An Execution Infrastructure for TCB Minimization
    • J.M. McCune et al., Flicker: An Execution Infrastructure for TCB Minimization, In Proc. of EuroSys2008, March 2008.
    • Proc. of EuroSys2008, March 2008
    • McCune, J.M.1
  • 29
    • 51949095281 scopus 로고    scopus 로고
    • Sun Microsystems, http://www.opensparc.net, 2008.
    • (2008) Sun Microsystems
  • 30
    • 47349124111 scopus 로고    scopus 로고
    • Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly
    • B. Rogers et al., Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly, In Proc. of Int'l Symp. on Microarchitecture (MICRO2007), Dec. 2007.
    • Proc. of Int'l Symp. on Microarchitecture (MICRO2007), Dec. 2007
    • Rogers, B.1
  • 31
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • R. Sailer et al., Design and implementation of a TCG-based integrity measurement architecture, In Proc. of USENIX Security, 2004.
    • Proc. of USENIX Security, 2004
    • Sailer, R.1
  • 35
    • 85084164351 scopus 로고    scopus 로고
    • Linux Security Modules: General Security Support for the Linux Kernel
    • C. Wright et al. Linux Security Modules: General Security Support for the Linux Kernel, Proc. of USENIX Security, August 2002
    • Proc. of USENIX Security, August 2002
    • Wright, C.1
  • 37
    • 77952576043 scopus 로고    scopus 로고
    • Trusted Boot: Trusted Boot: Verifying the Xen Launch
    • J. Cihula, Trusted Boot: Trusted Boot: Verifying the Xen Launch, Xen Summit 07 Fall.
    • Xen Summit 07 Fall
    • Cihula, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.