메뉴 건너뛰기




Volumn , Issue , 2013, Pages 571-582

Design space exploration and optimization of path oblivious RAM in secure processors

Author keywords

[No Author keywords available]

Indexed keywords

BASELINE CONFIGURATIONS; COMPUTATION MODEL; DESIGN SPACE EXPLORATION; INTEGRITY VERIFICATIONS; PERFORMANCE-DRIVEN; SECURE PROCESSORS; SECURITY COMMUNITY; TAMPER-RESISTANT;

EID: 84881169695     PISSN: 10636897     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2485922.2485971     Document Type: Conference Paper
Times cited : (112)

References (30)
  • 2
    • 80051954150 scopus 로고    scopus 로고
    • The trusted execution module: Commodity general-purpose trusted computing
    • V. Costan, L. F. G. Sarmenta, M. van Dijk, and S. Devadas, "The trusted execution module: Commodity general-purpose trusted computing," in CARDIS, 2008.
    • (2008) CARDIS
    • Costan, V.1    Sarmenta, L.F.G.2    Van Dijk, M.3    Devadas, S.4
  • 4
    • 84881168098 scopus 로고    scopus 로고
    • Ascend: An architecture for performing secure computation on encrypted data
    • April
    • C. W. Fletcher, "Ascend: An architecture for performing secure computation on encrypted data," in MIT CSAIL CSG Technical Memo 508, April 2013. [Online]. Available: http://csg.csail.mit.edu/pubs/memos/Memo-508/Memo- 508.pdf
    • (2013) MIT CSAIL CSG Technical Memo 508
    • Fletcher, C.W.1
  • 7
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation on oblivious rams
    • O. Goldreich, "Towards a theory of software protection and simulation on oblivious rams," in STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 8
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams," in J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 14
    • 84875090679 scopus 로고    scopus 로고
    • Toward practical private access to data centers via parallel oram
    • informal publication
    • J. R. Lorch, J. W. Mickens, B. Parno, M. Raykova, and J. Schiffman, "Toward practical private access to data centers via parallel oram.," IACR Cryptology ePrint Archive, Vol. 2012, p. 133, 2012, informal publication. [Online]. Available: http://dblp.uni-trier.de/db/journals/iacr/iacr2012. html#LorchMPRS12
    • (2012) IACR Cryptology EPrint Archive , vol.2012 , pp. 133
    • Lorch, J.R.1    Mickens, J.W.2    Parno, B.3    Raykova, M.4    Schiffman, J.5
  • 15
    • 82955198779 scopus 로고
    • Efficient computation on oblivious rams
    • R. Ostrovsky, "Efficient computation on oblivious rams," in STOC, 1990.
    • (1990) STOC
    • Ostrovsky, R.1
  • 16
    • 84867430969 scopus 로고    scopus 로고
    • Sesc: Superescalar simulator
    • university of illinois urbana-champaign ECE department
    • J. Renau, "Sesc: Superescalar simulator," university of illinois urbana-champaign ECE department, Tech. Rep., 2002. [Online]. Available: http://sesc.sourceforge.net/index.html
    • (2002) Tech. Rep.
    • Renau, J.1
  • 17
    • 79959550547 scopus 로고    scopus 로고
    • Dramsim2: A cycle accurate memory system simulator
    • Jan.-June
    • P. Rosenfeld, E. Cooper-Balis, and B. Jacob, "Dramsim2: A cycle accurate memory system simulator," Computer Architecture Letters, Vol. 10, no. 1, pp. 16-19, jan.-june 2011.
    • (2011) Computer Architecture Letters , vol.10 , Issue.1 , pp. 16-19
    • Rosenfeld, P.1    Cooper-Balis, E.2    Jacob, B.3
  • 21
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious ram
    • E. Stefanov, E. Shi, and D. Song, "Towards practical oblivious ram," in NDSS, 2012.
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 28
    • 84944392287 scopus 로고    scopus 로고
    • Fast secure processor for inhibiting software piracy and tampering
    • MICRO-36. Proceedings. 36th Annual IEEE/ACM International Symposium on, dec
    • J. Yang, Y. Zhang, and L. Gao, "Fast secure processor for inhibiting software piracy and tampering," in Microarchitecture, 2003. MICRO-36. Proceedings. 36th Annual IEEE/ACM International Symposium on, dec. 2003, pp. 351-360.
    • (2003) Microarchitecture, 2003 , pp. 351-360
    • Yang, J.1    Zhang, Y.2    Gao, L.3
  • 29
    • 84881121501 scopus 로고    scopus 로고
    • Efficient private information retrieval using secure hardware
    • April
    • X. Yu, C. Fletcher, L. Ren, M. van Dijk, and S. Devadas, "Efficient private information retrieval using secure hardware," in MIT CSAIL CSG Technical Memo 509, April 2013. [Online]. Available: http://csg.csail.mit.edu/ pubs/memos/Memo-509/Memo-509.pdf
    • (2013) MIT CSAIL CSG Technical Memo 509
    • Yu, X.1    Fletcher, C.2    Ren, L.3    Van Dijk, M.4    Devadas, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.