메뉴 건너뛰기




Volumn , Issue , 2010, Pages 120-126

Cryptkeeper: Improving security with encrypted RAM

Author keywords

Data security; Memory management; Operating systems

Indexed keywords

DATA EXPOSURE; DATA SECURITY; ENCRYPTION KEY; FIREFOX; LOW OVERHEAD; MEMORY MANAGEMENT; MEMORY MODELS; OPERATING SYSTEMS; PATHOLOGICAL CASE; PHYSICAL ATTACKS; RANDOM ACCESS MEMORIES; SECURITY POLICY; SIDE EFFECT; TARGET APPLICATION; USER DATA; VIRTUAL MEMORY; WORKING SET;

EID: 78651503546     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/THS.2010.5655081     Document Type: Conference Paper
Times cited : (44)

References (24)
  • 2
    • 84947196743 scopus 로고    scopus 로고
    • Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications
    • A. Czeskis et al., "Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications," 3rd USENIX HotSec, 2008.
    • (2008) 3rd USENIX HotSec
    • Czeskis, A.1
  • 3
    • 78651515990 scopus 로고    scopus 로고
    • 2009, accessed Tuesday, October 20th, 2009
    • G. Moore, "Intel Museum - Moore's Law," http://www.intel.com/ museum/archives/history-docs/mooreslaw.htm, 2009, accessed Tuesday, October 20th, 2009.
    • Intel Museum - Moore's Law
    • Moore, G.1
  • 8
    • 62749096566 scopus 로고    scopus 로고
    • Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms
    • N. El-Fishawy and O. M. A. Zaid, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms," International Journal of Network Security, 2007.
    • (2007) International Journal of Network Security
    • El-Fishawy, N.1    Zaid, O.M.A.2
  • 10
    • 78651476158 scopus 로고
    • Performance of symmetric ciphers and one-way hash functions
    • Springer Berlin/Heidelberg
    • M. Roe, "Performance of symmetric ciphers and one-way hash functions," in Fast Software Encryption, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 1995, pp. 359-362.
    • (1995) Fast Software Encryption, Ser. Lecture Notes in Computer Science , pp. 359-362
    • Roe, M.1
  • 12
    • 78651488262 scopus 로고    scopus 로고
    • Various accessed Tuesday, October 20th, 2009
    • Various, "The Linux Desktop Testing Project," http://ldtp.freedesktop.org/wiki/, accessed Tuesday, October 20th, 2009.
    • The Linux Desktop Testing Project
  • 14
    • 78651473598 scopus 로고    scopus 로고
    • Various 2001, accessed Monday, October 19th, 2009
    • Various, http://lkml.indiana.edu/hypermail/linux/kernel/0104.2/0282.html, 2001, accessed Monday, October 19th, 2009.
  • 15
    • 78651505015 scopus 로고    scopus 로고
    • Trusted Computing Group, "TPM Main Specification 1.2," http://www.trustedcomputinggroup.org/resources/tpm-main-specification.
    • TPM Main Specification 1.2
  • 16
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • R. Canetti et al., "Exposure-Resilient Functions and All-or-Nothing Transforms," EUROCRYPT 2000, LNCS 1807, 2000.
    • (2000) EUROCRYPT 2000, LNCS 1807
    • Canetti, R.1
  • 20
    • 0004196480 scopus 로고
    • (PhD Thesis) Ph.D. dissertation, School of Computer Science, Carnegie Mellon University
    • -, "Using Secure Coprocessors (PhD Thesis)," Ph.D. dissertation, School of Computer Science, Carnegie Mellon University, 1994.
    • (1994) Using Secure Coprocessors
  • 22
    • 84957086893 scopus 로고    scopus 로고
    • How to forget a secret
    • (extended abstract)
    • G. D. Crescenzo et al., "How to forget a secret (extended abstract)," STACS'99, LNCS 1563, 1999.
    • (1999) STACS'99, LNCS 1563
    • Crescenzo, G.D.1
  • 24
    • 41549090527 scopus 로고    scopus 로고
    • Memory predecryption: Hiding the latency overhead of memory encryption
    • B. Rogers et al., "Memory predecryption: hiding the latency overhead of memory encryption," SIGARCH Comput. Archit. News, vol. 33, no. 1, pp. 27-33, 2005.
    • (2005) SIGARCH Comput. Archit. News , vol.33 , Issue.1 , pp. 27-33
    • Rogers, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.