메뉴 건너뛰기




Volumn , Issue , 2013, Pages 51-65

Memory trace oblivious program execution

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD SERVICE PROVIDERS; COMPUTING INFRASTRUCTURES; COMPUTING PLATFORM; HARDWARE SUPPORTS; MEMORY ENCRYPTION; OPTIMAL EFFICIENCY; PROGRAM EXECUTION; SENSITIVE INFORMATIONS;

EID: 84885008414     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2013.11     Document Type: Conference Paper
Times cited : (60)

References (50)
  • 4
    • 33646392466 scopus 로고    scopus 로고
    • Preventing timing leaks through transactional branching instructions
    • May
    • Gilles Barthe, Tamara Rezk, and Martijn Warnier. Preventing timing leaks through transactional branching instructions. Electron. Notes Theor. Comput. Sci., 153(2):33-55, May 2006.
    • (2006) Electron. Notes Theor. Comput. Sci , vol.153 , Issue.2 , pp. 33-55
    • Barthe, G.1    Rezk, T.2    Warnier, M.3
  • 6
    • 84884993765 scopus 로고    scopus 로고
    • HMC Consortium
    • HMC Consortium. Hybrid memory cube. http://hybridmemorycube. org/.
    • Hybrid Memory Cube
  • 11
    • 78650606457 scopus 로고    scopus 로고
    • Privacy-preserving data-oblivious geometric algorithms for geographic data
    • David Eppstein, Michael T. Goodrich, and Roberto Tamassia. Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS, pages 13-22, 2010.
    • (2010) GIS , pp. 13-22
    • Eppstein, D.1    Goodrich, M.T.2    Tamassia, R.3
  • 16
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In ACM Symposium on Theory of Computing (STOC), 1987.
    • (1987) ACM Symposium on Theory of Computing (STOC)
    • Goldreich, O.1
  • 17
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 20
    • 84874155278 scopus 로고    scopus 로고
    • Data-oblivious graph drawing model and algorithms
    • abs/1209. 0756
    • Michael T. Goodrich, Olga Ohrimenko, and Roberto Tamassia. Data-oblivious graph drawing model and algorithms. CoRR, abs/1209. 0756, 2012.
    • (2012) CoRR
    • Goodrich, M.T.1    Ohrimenko, O.2    Tamassia, R.3
  • 22
    • 28044445125 scopus 로고    scopus 로고
    • Timing aware in-formation flow security for a javacard-like bytecode
    • December
    • Daniel Hedin and David Sands. Timing aware in-formation flow security for a javacard-like bytecode. Electron. Notes Theor. Comput. Sci., 141(1):163-182, December 2005.
    • (2005) Electron. Notes Theor. Comput. Sci. , vol.141 , Issue.1 , pp. 163-182
    • Hedin, D.1    Sands, D.2
  • 24
    • 84885007548 scopus 로고    scopus 로고
    • Safety joins performance: Infineon introduces automotive multicore 32-bit microcontroller family aurix-tm to meet safety and powertrain requirements of upcoming vehicle generations
    • Safety joins performance: Infineon introduces automotive multicore 32-bit microcontroller family aurix-tm to meet safety and powertrain requirements of upcoming vehicle generations. http://www. infineon. com/cms/en/corporate/press/ news/ releases/2012/INFATV201205-040. html.
  • 25
    • 84885008496 scopus 로고    scopus 로고
    • Jif: Java + information flow
    • Jif: Java + information flow. http://www. cs. cornell. edu/ jif/.
  • 32
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ml
    • January
    • François Pottier and Vincent Simonet. Information flow inference for ml. ACM Trans. Program. Lang. Syst., 25(1):117-158, January 2003.
    • (2003) ACM Trans. Program. Lang. Syst. , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 36
    • 82955173838 scopus 로고    scopus 로고
    • Oblivious RAM with O((logN)3) worstcase cost
    • Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, and Mingfei Li. Oblivious RAM with O((logN)3) worstcase cost. In ASIACRYPT, pages 197-214, 2011.
    • (2011) ASIACRYPT , pp. 197-214
    • Shi, E.1    Hubert Chan, T.-H.2    Stefanov, E.3    Li, M.4
  • 41
    • 27244444861 scopus 로고    scopus 로고
    • Technical Report UCAM-CL-TR-536, University of Cambridge, Computer Laboratory, June
    • Sergei Skorobogatov. Low temperature data remanence in static RAM. Technical Report UCAM-CL-TR-536, University of Cambridge, Computer Laboratory, June 2002.
    • (2002) Low Temperature Data Remanence in Static RAM
    • Skorobogatov, S.1
  • 45
    • 84869381921 scopus 로고    scopus 로고
    • Single round access privacy on outsourced storage
    • Peter Williams and Radu Sion. Single round access privacy on outsourced storage. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 49
    • 84866417462 scopus 로고    scopus 로고
    • Language-based control and mitigation of timing channels
    • Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. Language-based control and mitigation of timing channels. In PLDI, pages 99-110, 2012.
    • (2012) PLDI , pp. 99-110
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 50
    • 12844260675 scopus 로고    scopus 로고
    • Hide: An infrastructure for efficiently protecting information leakage on the address bus
    • October
    • Xiaotong Zhuang, Tao Zhang, and Santosh Pande. Hide: an infrastructure for efficiently protecting information leakage on the address bus. SIGARCH Comput. Archit. News, 32(5):72-84, October 2004.
    • (2004) SIGARCH Comput. Archit. News , vol.32 , Issue.5 , pp. 72-84
    • Zhuang, X.1    Zhang, T.2    Pande, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.