메뉴 건너뛰기




Volumn , Issue , 2011, Pages 108-119

SecureME: A hardware-software approach to full system security

Author keywords

cloaking; hardware attacks; operating systems; security

Indexed keywords

CLOAKING; COMPUTING ENVIRONMENTS; COMPUTING NODES; EXECUTION TIME; HARDWARE ATTACK; HARDWARE ATTACKS; INTERPROCESS COMMUNICATION; MICROBENCHMARKS; PERFORMANCE EVALUATION; SECURE PROCESSORS; SECURITY; SECURITY BREACHES; SPATIO-TEMPORAL; STORAGE OVERHEAD; SYSTEM CALLS; SYSTEM SECURITY; VIRTUAL MEMORY MANAGEMENT;

EID: 79959617325     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1995896.1995914     Document Type: Conference Paper
Times cited : (74)

References (36)
  • 2
    • 79959576295 scopus 로고    scopus 로고
    • A Secure and Reliable Bootstrap Architecture
    • W. Arbaugh, D. Farber, and J. Smith. A Secure and Reliable Bootstrap Architecture. In ISSP, 1997.
    • (1997) ISSP
    • Arbaugh, W.1    Farber, D.2    Smith, J.3
  • 4
    • 77952579228 scopus 로고    scopus 로고
    • Scalable Architectural Support for Trusted Software
    • D. Champagne and R. Lee. Scalable Architectural Support for Trusted Software. In HPCA, 2010.
    • (2010) HPCA
    • Champagne, D.1    Lee, R.2
  • 6
    • 77950972215 scopus 로고    scopus 로고
    • SHIELDSTRAP: Making Secure Processors Truly Secure
    • S. Chhabra, B. Rogers, and Y. Solihin. SHIELDSTRAP: Making Secure Processors Truly Secure. In ICCD, 2009.
    • (2009) ICCD
    • Chhabra, S.1    Rogers, B.2    Solihin, Y.3
  • 7
    • 0034442456 scopus 로고    scopus 로고
    • Hoard: A scalable memory allocator for multithreaded applications
    • Emery D. Berger and Kathryn S. Mckinley and Robert D. Blumofe and Paul R. Wilson. Hoard: A scalable memory allocator for multithreaded applications. In ASPLOS, 2000.
    • (2000) ASPLOS
    • Berger, E.D.1    Mckinley, K.S.2    Blumofe, R.D.3    Wilson, P.R.4
  • 8
    • 0003629991 scopus 로고
    • FIPS Publication 180-1. NIST, Federal Information Processing Standards
    • FIPS Publication 180-1. Secure Hash Standard. NIST, Federal Information Processing Standards, 1995.
    • (1995) Secure Hash Standard
  • 9
    • 84955507265 scopus 로고    scopus 로고
    • Caches and Hash Trees for Efficient Memory Integrity Verification
    • B. Gassend, G. Suh, D. Clarke, M. Dijk, and S. Devadas. Caches and Hash Trees for Efficient Memory Integrity Verification. In HPCA, 2003.
    • (2003) HPCA
    • Gassend, B.1    Suh, G.2    Clarke, D.3    Dijk, M.4    Devadas, S.5
  • 16
    • 4444322842 scopus 로고    scopus 로고
    • Specifying and Verifying Hardware for Tamper-Resistant Software
    • D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz. Specifying and Verifying Hardware for Tamper-Resistant Software. In ISSP, 2003.
    • (2003) ISSP
    • Lie, D.1    Mitchell, J.2    Thekkath, C.3    Horowitz, M.4
  • 18
    • 2342499828 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In SOSP, 2003.
    • (2003) SOSP
    • Lie, D.1    Thekkath, C.A.2    Horowitz, M.3
  • 22
    • 47349124111 scopus 로고    scopus 로고
    • Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly
    • B. Rogers, S. Chhabra, Y. Solihin, and M. Prvulovic. Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. In MICRO, 2007.
    • (2007) MICRO
    • Rogers, B.1    Chhabra, S.2    Solihin, Y.3    Prvulovic, M.4
  • 23
    • 34247118899 scopus 로고    scopus 로고
    • Efficient Data Protection for Distributed Shared Memory Multiprocessors
    • B. Rogers, Y. Solihin, and M. Prvulovic. Efficient Data Protection for Distributed Shared Memory Multiprocessors. In PACT, 2006.
    • (2006) PACT
    • Rogers, B.1    Solihin, Y.2    Prvulovic, M.3
  • 24
    • 70449824733 scopus 로고    scopus 로고
    • Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In SOSP, 2007.
    • (2007) SOSP
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 25
    • 40349095134 scopus 로고    scopus 로고
    • Authentication Control Point and Its Implications for Secure Processor Design
    • W. Shi and H.-H. Lee. Authentication Control Point and Its Implications for Secure Processor Design. In MICRO, 2006.
    • (2006) MICRO
    • Shi, W.1    Lee, H.-H.2
  • 26
    • 10444227999 scopus 로고    scopus 로고
    • Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems
    • W. Shi, H.-H. Lee, M. Ghosh, and C. Lu. Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. In PACT, 2004.
    • (2004) PACT
    • Shi, W.1    Lee, H.-H.2    Ghosh, M.3    Lu, C.4
  • 27
    • 27544453319 scopus 로고    scopus 로고
    • High Efficiency Counter Mode Security Architecture via Prediction and Precomputation
    • W. Shi, H.-H. Lee, M. Ghosh, C. Lu, and A. Boldyreva. High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. In ISCA, 2005.
    • (2005) ISCA
    • Shi, W.1    Lee, H.-H.2    Ghosh, M.3    Lu, C.4    Boldyreva, A.5
  • 28
    • 79959622920 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation. http://www.spec.org, 2006.
    • (2006)
  • 29
    • 1142280988 scopus 로고    scopus 로고
    • AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
    • G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In ICS, 2003.
    • (2003) ICS
    • Suh, G.1    Clarke, D.2    Gassend, B.3    Van Dijk, M.4    Devadas, S.5
  • 30
    • 84944412608 scopus 로고    scopus 로고
    • Efficient Memory Integrity Verification and Encryption for Secure Processor
    • G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. Efficient Memory Integrity Verification and Encryption for Secure Processor. In MICRO, 2003.
    • (2003) MICRO
    • Suh, G.1    Clarke, D.2    Gassend, B.3    Van Dijk, M.4    Devadas, S.5
  • 31
    • 85069458084 scopus 로고    scopus 로고
    • Splitting interfaces: Making trust between applications and operating systems configurable
    • R. Ta-min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In OSDI, 2006.
    • (2006) OSDI
    • Ta-min, R.1    Litty, L.2    Lie, D.3
  • 32
    • 84978382687 scopus 로고    scopus 로고
    • Memory resource management in vmware esx server
    • C. A. Waldspurger. Memory resource management in vmware esx server. SIGOPS Operating Systems Review, 36(SI):181-194, 2002.
    • (2002) SIGOPS Operating Systems Review , vol.36 , Issue.SI , pp. 181-194
    • Waldspurger, C.A.1
  • 33
    • 33845900936 scopus 로고    scopus 로고
    • Improving Cost, Performance, and Security of Memory Encryption and Authentication
    • C. Yan, B. Rogers, D. Englender, Y. Solihin, and M. Prvulovic. Improving Cost, Performance, and Security of Memory Encryption and Authentication. In ISCA, 2006.
    • (2006) ISCA
    • Yan, C.1    Rogers, B.2    Englender, D.3    Solihin, Y.4    Prvulovic, M.5
  • 34
    • 77952404303 scopus 로고    scopus 로고
    • Using hypervisor to provide data secrecy for user applications on a per-page basis
    • J. Yang and K. G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In VEE, 2008.
    • (2008) VEE
    • Yang, J.1    Shin, K.G.2
  • 35
    • 84944392287 scopus 로고    scopus 로고
    • Fast Secure Processor for Inhibiting Software Piracy and Tampering
    • J. Yang, Y. Zhang, and L. Gao. Fast Secure Processor for Inhibiting Software Piracy and Tampering. In MICRO, 2003.
    • (2003) MICRO
    • Yang, J.1    Zhang, Y.2    Gao, L.3
  • 36
    • 28444455956 scopus 로고    scopus 로고
    • SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
    • Y. Zhang, L. Gao, J. Yang, X. Zhang, and R. Gupta. SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. In HPCA, 2005.
    • (2005) HPCA
    • Zhang, Y.1    Gao, L.2    Yang, J.3    Zhang, X.4    Gupta, R.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.