-
1
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
May
-
W. Arbaugh, D. Farber, and J. Smith, "A Secure and Reliable Bootstrap Architecture," in Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997, pp. 65-71. [Online]. Available: citeseer.nj.nec.com/arbaugh97secure.html
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.1
Farber, D.2
Smith, J.3
-
2
-
-
80051954150
-
The trusted execution module: Commodity general-purpose trusted computing
-
V. Costan, L. F. G. Sarmenta, M. van Dijk, and S. Devadas, "The trusted execution module: Commodity general-purpose trusted computing," in CARDIS, 2008.
-
(2008)
CARDIS
-
-
Costan, V.1
Sarmenta, L.F.G.2
Van Dijk, M.3
Devadas, S.4
-
3
-
-
84869402047
-
Secure processor architecture for encrypted computation on untrusted programs
-
Oct
-
C. Fletcher, M. van Dijk, and S. Devadas, "Secure Processor Architecture for Encrypted Computation on Untrusted Programs," in Proceedings of the 7th ACM CCS Workshop on Scalable Trusted Computing, Oct. 2012, pp. 3-8.
-
(2012)
Proceedings of the 7th ACM CCS Workshop on Scalable Trusted Computing
, pp. 3-8
-
-
Fletcher, C.1
Van Dijk, M.2
Devadas, S.3
-
4
-
-
84881168098
-
Ascend: An architecture for performing secure computation on encrypted data
-
April
-
C. W. Fletcher, "Ascend: An architecture for performing secure computation on encrypted data," in MIT CSAIL CSG Technical Memo 508, April 2013. [Online]. Available: http://csg.csail.mit.edu/pubs/memos/Memo-508/Memo- 508.pdf
-
(2013)
MIT CSAIL CSG Technical Memo 508
-
-
Fletcher, C.W.1
-
5
-
-
34247169669
-
A low-cost memory remapping scheme for address bus protection
-
ACM http://doi.acm.org/10.1145/1152154.1152169
-
L. Gao, J. Yang, M. Chrobak, Y. Zhang, S. Nguyen, and H.-H. S. Lee, "A low-cost memory remapping scheme for address bus protection," in Proceedings of the 15th PACT, ser. PACT '06. ACM, 2006. [Online]. Available: http://doi.acm.org/10.1145/1152154.1152169
-
(2006)
Proceedings of the 15th PACT, ser. PACT '06
-
-
Gao, L.1
Yang, J.2
Chrobak, M.3
Zhang, Y.4
Nguyen, S.5
Lee, H.-H.S.6
-
6
-
-
84955507265
-
Caches and merkle trees for efficient memory integrity verification
-
New-York: IEEE, February
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas, "Caches and Merkle Trees for Efficient Memory Integrity Verification," in Proceedings of Ninth International Symposium on High Performance Computer Architecture. New-York: IEEE, February 2003.
-
(2003)
Proceedings of Ninth International Symposium on High Performance Computer Architecture
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
7
-
-
0023547498
-
Towards a theory of software protection and simulation on oblivious rams
-
O. Goldreich, "Towards a theory of software protection and simulation on oblivious rams," in STOC, 1987.
-
(1987)
STOC
-
-
Goldreich, O.1
-
8
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams," in J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
11
-
-
4444322842
-
Specifying and verifying hardware for tamper-resistant software
-
D. Lie, J. Mitchell, C. Thekkath, and M. Horwitz, "Specifying and verifying hardware for tamper-resistant software," in Proceedings of the IEEE Symposium on Security and Privacy, 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Lie, D.1
Mitchell, J.2
Thekkath, C.3
Horwitz, M.4
-
12
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
D. Lie, C. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003, pp. 178-192.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.2
Horowitz, M.3
-
13
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
November
-
th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), November 2000, pp. 168-177.
-
(2000)
th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
14
-
-
84875090679
-
Toward practical private access to data centers via parallel oram
-
informal publication
-
J. R. Lorch, J. W. Mickens, B. Parno, M. Raykova, and J. Schiffman, "Toward practical private access to data centers via parallel oram.," IACR Cryptology ePrint Archive, Vol. 2012, p. 133, 2012, informal publication. [Online]. Available: http://dblp.uni-trier.de/db/journals/iacr/iacr2012. html#LorchMPRS12
-
(2012)
IACR Cryptology EPrint Archive
, vol.2012
, pp. 133
-
-
Lorch, J.R.1
Mickens, J.W.2
Parno, B.3
Raykova, M.4
Schiffman, J.5
-
15
-
-
82955198779
-
Efficient computation on oblivious rams
-
R. Ostrovsky, "Efficient computation on oblivious rams," in STOC, 1990.
-
(1990)
STOC
-
-
Ostrovsky, R.1
-
16
-
-
84867430969
-
Sesc: Superescalar simulator
-
university of illinois urbana-champaign ECE department
-
J. Renau, "Sesc: Superescalar simulator," university of illinois urbana-champaign ECE department, Tech. Rep., 2002. [Online]. Available: http://sesc.sourceforge.net/index.html
-
(2002)
Tech. Rep.
-
-
Renau, J.1
-
17
-
-
79959550547
-
Dramsim2: A cycle accurate memory system simulator
-
Jan.-June
-
P. Rosenfeld, E. Cooper-Balis, and B. Jacob, "Dramsim2: A cycle accurate memory system simulator," Computer Architecture Letters, Vol. 10, no. 1, pp. 16-19, jan.-june 2011.
-
(2011)
Computer Architecture Letters
, vol.10
, Issue.1
, pp. 16-19
-
-
Rosenfeld, P.1
Cooper-Balis, E.2
Jacob, B.3
-
18
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Nov.
-
L. F. G. Sarmenta, M. van Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas, "Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS," in Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06), Nov. 2006.
-
(2006)
Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06)
-
-
Sarmenta, L.F.G.1
Van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
20
-
-
84869473022
-
-
Cornell University Library, arXiv:1202.5150v1, 2012, arxiv.org/abs/1202. 5150
-
E. Stefanov and E. Shi, "Path O-RAM: An Extremely Simple Oblivious RAM Protocol," Cornell University Library, arXiv:1202.5150v1, 2012, arxiv.org/abs/1202.5150.
-
Path O-RAM: An Extremely Simple Oblivious RAM Protocol
-
-
Stefanov, E.1
Shi, E.2
-
21
-
-
85180805635
-
Towards practical oblivious ram
-
E. Stefanov, E. Shi, and D. Song, "Towards practical oblivious ram," in NDSS, 2012.
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
26
-
-
33845900936
-
Improving cost, performance, and security of memory encryption and authentication
-
C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin, "Improving cost, performance, and security of memory encryption and authentication," in Proceedings of the 33rd annual international symposium on Computer Architecture, ser. ISCA '06, 2006, pp. 179-190.
-
(2006)
Proceedings of the 33rd Annual International Symposium on Computer Architecture, ser. ISCA '06
, pp. 179-190
-
-
Yan, C.1
Englender, D.2
Prvulovic, M.3
Rogers, B.4
Solihin, Y.5
-
27
-
-
77949917390
-
A low-cost memory remapping scheme for address bus protection
-
J. Yang, L. Gao, Y. Zhang, M. Chrobak, and H. Lee, "A low-cost memory remapping scheme for address bus protection," Journal of Parallel and Distributed Computing, Vol. 70, no. 5, pp. 443-457, 2010.
-
(2010)
Journal of Parallel and Distributed Computing
, vol.70
, Issue.5
, pp. 443-457
-
-
Yang, J.1
Gao, L.2
Zhang, Y.3
Chrobak, M.4
Lee, H.5
-
28
-
-
84944392287
-
Fast secure processor for inhibiting software piracy and tampering
-
MICRO-36. Proceedings. 36th Annual IEEE/ACM International Symposium on, dec
-
J. Yang, Y. Zhang, and L. Gao, "Fast secure processor for inhibiting software piracy and tampering," in Microarchitecture, 2003. MICRO-36. Proceedings. 36th Annual IEEE/ACM International Symposium on, dec. 2003, pp. 351-360.
-
(2003)
Microarchitecture, 2003
, pp. 351-360
-
-
Yang, J.1
Zhang, Y.2
Gao, L.3
-
29
-
-
84881121501
-
Efficient private information retrieval using secure hardware
-
April
-
X. Yu, C. Fletcher, L. Ren, M. van Dijk, and S. Devadas, "Efficient private information retrieval using secure hardware," in MIT CSAIL CSG Technical Memo 509, April 2013. [Online]. Available: http://csg.csail.mit.edu/ pubs/memos/Memo-509/Memo-509.pdf
-
(2013)
MIT CSAIL CSG Technical Memo 509
-
-
Yu, X.1
Fletcher, C.2
Ren, L.3
Van Dijk, M.4
Devadas, S.5
-
30
-
-
12844260675
-
HIDE: An infrastructure for efficiently protecting information leakage on the address bus
-
New York, NY, USA: ACM Press
-
X. Zhuang, T. Zhang, and S. Pande, "HIDE: an infrastructure for efficiently protecting information leakage on the address bus," in ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems. New York, NY, USA: ACM Press, 2004, pp. 72-84.
-
(2004)
ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 72-84
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
|