메뉴 건너뛰기




Volumn , Issue , 2011, Pages 375-388

SICE: A hardware-level strongly isolated computing environment for x86 multi-core platforms

Author keywords

Isolation; Trusted computing; Virtualization security

Indexed keywords

COMPUTING ENVIRONMENTS; CONTEXT SWITCHING; HARDWARE ARCHITECTURE; HARDWARE IMPLEMENTATIONS; HARDWARE PLATFORM; HYPERVISOR; ISOLATION; ISOLATION TECHNIQUES; LINES OF CODE; MULTI-CORE PLATFORMS; MULTI-CORE PROCESSOR; SOFTWARE COMPONENT; SYSTEM MANAGEMENT MODE; TRUSTED COMPUTING; TRUSTED COMPUTING BASE; UNIQUE FEATURES; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 80755169488     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046752     Document Type: Conference Paper
Times cited : (119)

References (34)
  • 4
    • 80755188353 scopus 로고    scopus 로고
    • BusyBox. http://www.busybox.net/.
  • 8
    • 44049086023 scopus 로고    scopus 로고
    • Aes-cbc + elephant diffuser: A disk encryption algorithm for windows vista
    • Niels Ferguson. Aes-cbc + elephant diffuser: A disk encryption algorithm for windows vista. Microsoft Corporation Technical Report, 2006.
    • (2006) Microsoft Corporation Technical Report
    • Ferguson, N.1
  • 9
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM symposium on Operating systems principles (SOSP '03), pages 193-206, 2003. (Pubitemid 40929697)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 10
    • 0003722586 scopus 로고    scopus 로고
    • Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba revision 3.0b, October
    • Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification. revision 3.0b, October 2006.
    • (2006) Advanced Configuration and Power Interface Specification
  • 16
    • 77954962880 scopus 로고    scopus 로고
    • Hacking 3D (and breaking out of VMWare)
    • K. Kortchinsky. Hacking 3D (and breaking out of VMWare). In Black Hat conference, 2009.
    • (2009) Black Hat Conference
    • Kortchinsky, K.1
  • 17
    • 84903437325 scopus 로고    scopus 로고
    • Accessed in August 2011
    • Dartmouth PKI Lab. TPM reset attack. http://www.cs.dartmouth.edu/~pkilab/ sparks/. Accessed in August 2011.
    • TPM Reset Attack
  • 24
    • 84871506561 scopus 로고    scopus 로고
    • Accessed in August 2011
    • Secunia. Xen multiple vulnerability report. http://secunia.com/ advisories/44502/. Accessed in August 2011.
    • Xen Multiple Vulnerability Report
  • 26
    • 35648971620 scopus 로고    scopus 로고
    • Cell broadband engine processor vault security architecture
    • DOI 10.1147/rd.515.0521
    • K. Shimizu, H. P. Hofstee, and J. S. Liberty. Cell broadband engine processor vault security architecture. IBM J. Res. Dev., pages 521-528, September 2007. (Pubitemid 350031352)
    • (2007) IBM Journal of Research and Development , vol.51 , Issue.5 , pp. 521-528
    • Shimizu, K.1    Hofstee, H.P.2    Liberty, J.S.3
  • 28
    • 80755174225 scopus 로고    scopus 로고
    • Trusted Computing Group. https://www.trustedcomputinggroup.org/.
  • 29
    • 78650023510 scopus 로고    scopus 로고
    • July
    • Trusted Computing Group. TPM specifications version 1.2. https://www.trustedcomputinggroup.org/downloads/specifications/tpm/tpm, July 2005.
    • (2005) TPM Specifications Version 1.2
  • 33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.