-
1
-
-
84889046401
-
-
"PrivateCore," http://www.privatecore.com/.
-
PrivateCore
-
-
-
2
-
-
0033702592
-
Transforming out Timing Leaks
-
J. Agat, "Transforming out Timing Leaks," in POPL, 2000.
-
(2000)
POPL
-
-
Agat, J.1
-
3
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
A. Askarov, D. Zhang, and A. C. Myers, "Predictive black-box mitigation of timing channels," in CCS, 2010.
-
(2010)
CCS
-
-
Askarov, A.1
Zhang, D.2
Myers, A.C.3
-
4
-
-
78650158728
-
Determinating Timing Channels in Compute Clouds
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating Timing Channels in Compute Clouds," in CCSW, 2010.
-
(2010)
CCSW
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
5
-
-
84863554443
-
Chisel: Constructing Hardware in a Scala Embedded Language
-
J. Bachrach, H. Vo, B. Richards, Y. Lee, A. Waterman, R. Avizienis, J. Wawrzynek, and K. Asanovic, "Chisel: Constructing Hardware in a Scala Embedded Language," in DAC, 2012.
-
(2012)
DAC
-
-
Bachrach, J.1
Vo, H.2
Richards, B.3
Lee, Y.4
Waterman, A.5
Avizienis, R.6
Wawrzynek, J.7
Asanovic, K.8
-
7
-
-
70449623154
-
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
-
B. Coppens, I. Verbauwhede, K. D. Bosschere, and B. D. Sutter, "Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors," in SP, 2009.
-
(2009)
SP
-
-
Coppens, B.1
Verbauwhede, I.2
Bosschere, K.D.3
Sutter, B.D.4
-
8
-
-
67650035136
-
DMP: Deterministic Shared Memory Multiprocessing
-
J. Devietti, B. Lucia, L. Ceze, and M. Oskin, "DMP: Deterministic Shared Memory Multiprocessing," in ASPLOS, 2009.
-
(2009)
ASPLOS
-
-
Devietti, J.1
Lucia, B.2
Ceze, L.3
Oskin, M.4
-
9
-
-
84881225045
-
A Secure Processor Architecture for Encrypted Computation on Untrusted Programs
-
C. W. Fletcher, M. v. Dijk, and S. Devadas, "A Secure Processor Architecture for Encrypted Computation on Untrusted Programs," in STC, 2012.
-
(2012)
STC
-
-
Fletcher, C.W.1
Dijk, M.V.2
Devadas, S.3
-
10
-
-
84907816512
-
Optimizing oram and using it efficiently for secure computation
-
C. Gentry, K. Goldman, S. Halevi, C. Julta, M. Raykova, and D. Wichs, "Optimizing oram and using it efficiently for secure computation," in PETS, 2013.
-
(2013)
PETS
-
-
Gentry, C.1
Goldman, K.2
Halevi, S.3
Julta, C.4
Raykova, M.5
Wichs, D.6
-
11
-
-
0023547498
-
Towards a Theory of Software Protection and Simulation by Oblivious RAMs
-
O. Goldreich, "Towards a Theory of Software Protection and Simulation by Oblivious RAMs," in STOC, 1987.
-
(1987)
STOC
-
-
Goldreich, O.1
-
12
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
13
-
-
84881228714
-
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
-
M. T. Goodrich and M. Mitzenmacher, "Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation," in ICALP, 2011.
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
14
-
-
84860169197
-
Privacy-preserving Group Data Access via Stateless Oblivious RAM Simulation
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Privacy-preserving Group Data Access via Stateless Oblivious RAM Simulation," in SODA, 2012.
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
15
-
-
84870525044
-
OS-Sommelier: Memory-only Operating System Fingerprinting in the Cloud
-
Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin, "OS-Sommelier: Memory-only Operating System Fingerprinting in the Cloud," in SoCC, 2012.
-
(2012)
SoCC
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
17
-
-
66149173689
-
Lest We Remember: Cold-boot Attacks on Encryption Keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten, "Lest We Remember: Cold-boot Attacks on Encryption Keys," Commun. ACM, vol. 52, no. 5, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.5
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
18
-
-
18644367181
-
A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA
-
A. Hodjat and I. Verbauwhede, "A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA," in FCCM, 2004.
-
(2004)
FCCM
-
-
Hodjat, A.1
Verbauwhede, I.2
-
19
-
-
0742293360
-
Keeping Secrets in Hardware: The Microsoft Xbox Case Study
-
A. Huang, "Keeping Secrets in Hardware: The Microsoft Xbox Case Study," in CHES, 2002.
-
(2002)
CHES
-
-
Huang, A.1
-
20
-
-
72249120603
-
seL4: Formal Verification of an OS Kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal Verification of an OS Kernel," in SOSP, 2009.
-
(2009)
SOSP
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
21
-
-
84860181777
-
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky, "On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme," in SODA, 2012.
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
22
-
-
84890416103
-
Shroud: Ensuring Private Access to Large-Scale Data in the Data Center
-
J. R. Lorch and B. Parno, "Shroud: Ensuring Private Access to Large-Scale Data in the Data Center," in FAST, 2013.
-
(2013)
FAST
-
-
Lorch, J.R.1
Parno, B.2
-
23
-
-
84864837138
-
TimeWarp: Rethinking Timekeeping and Performance Monitoring Mechanisms to Mitigate Side-channel Attacks
-
R. Martin, J. Demme, and S. Sethumadhavan, "TimeWarp: Rethinking Timekeeping and Performance Monitoring Mechanisms to Mitigate Side-channel Attacks," in ISCA, 2012.
-
(2012)
ISCA
-
-
Martin, R.1
Demme, J.2
Sethumadhavan, S.3
-
24
-
-
0030714231
-
Private Information Storage
-
Extended Abstract
-
R. Ostrovsky and V. Shoup, "Private Information Storage (Extended Abstract)," in STOC, 1997.
-
(1997)
STOC
-
-
Ostrovsky, R.1
Shoup, V.2
-
25
-
-
84893446005
-
Integrity verification for path oblivious-ram
-
L. Ren, C. Fletcher, X. Yu, M. van Dijk, and S. Devadas, "Integrity verification for path oblivious-ram," in HPEC, 2013.
-
(2013)
HPEC
-
-
Ren, L.1
Fletcher, C.2
Yu, X.3
Van Dijk, M.4
Devadas, S.5
-
26
-
-
84881169695
-
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
-
L. Ren, X. Yu, C. W. Fletcher, M. van Dijk, and S. Devadas, "Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors," in ISCA, 2013.
-
(2013)
ISCA
-
-
Ren, L.1
Yu, X.2
Fletcher, C.W.3
Van Dijk, M.4
Devadas, S.5
-
27
-
-
47349124111
-
Using address independent seed encryption and bonsai merkle trees to make secure processors os- and performance-friendly
-
B. Rogers, S. Chhabra, M. Prvulovic, and Y. Solihin, "Using address independent seed encryption and bonsai merkle trees to make secure processors os- and performance-friendly," in MICRO, 2007.
-
(2007)
MICRO
-
-
Rogers, B.1
Chhabra, S.2
Prvulovic, M.3
Solihin, Y.4
-
29
-
-
17444403861
-
Outbound Authentication for Programmable Secure Coprocessors
-
S. W. Smith, "Outbound Authentication for Programmable Secure Coprocessors," in ESORICS, 2002.
-
(2002)
ESORICS
-
-
Smith, S.W.1
-
30
-
-
84881250193
-
Oblivistore: High performance oblivious cloud storage
-
E. Stefanov and E. Shi, "Oblivistore: High performance oblivious cloud storage," in S & P, 2013.
-
(2013)
S & P
-
-
Stefanov, E.1
Shi, E.2
-
31
-
-
85180805635
-
Towards Practical Oblivious RAM
-
E. Stefanov, E. Shi, and D. Song, "Towards Practical Oblivious RAM," in NDSS, 2012.
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
32
-
-
84889005645
-
Path O-RAM: An Extremely Simple Oblivious RAM Protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas, "Path O-RAM: An Extremely Simple Oblivious RAM Protocol," in CCS, 2013.
-
(2013)
CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
33
-
-
1142280988
-
AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing," in ICS, 2003.
-
(2003)
ICS
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
34
-
-
0039927533
-
Architectural Support for Copy and Tamper Resistant Software
-
D. L. C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," SIGOPS Oper. Syst. Rev., vol. 34, no. 5, pp. 168-177, 2000.
-
(2000)
SIGOPS Oper. Syst. Rev.
, vol.34
, Issue.5
, pp. 168-177
-
-
Thekkath, D.L.C.1
Mitchell, M.2
Lincoln, P.3
Boneh, D.4
Mitchell, J.5
Horowitz, M.6
-
35
-
-
67650085261
-
Complete Information Flow Tracking from the Gates up
-
M. Tiwari, H. M. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood, "Complete Information Flow Tracking from the Gates up," in ASPLOS, 2009.
-
(2009)
ASPLOS
-
-
Tiwari, M.1
Wassel, H.M.2
Mazloom, B.3
Mysore, S.4
Chong, F.T.5
Sherwood, T.6
-
36
-
-
80051995886
-
Silencing Hardware Backdoors
-
A. Waksman and S. Sethumadhavan, "Silencing Hardware Backdoors," in SP, 2011.
-
(2011)
SP
-
-
Waksman, A.1
Sethumadhavan, S.2
-
37
-
-
84889042182
-
-
EECS Department, UC Berkeley, Tech. Rep. UCB/EECS-2011-62, May
-
A. Waterman, Y. Lee, D. A. Patterson, and K. Asanović, "The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA," EECS Department, UC Berkeley, Tech. Rep. UCB/EECS-2011-62, May 2011.
-
(2011)
The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA
-
-
Waterman, A.1
Lee, Y.2
Patterson, D.A.3
Asanović, K.4
-
38
-
-
84881256639
-
Round-Optimal Access Privacy on Outsourced Storage
-
P. Williams and R. Sion, "Round-Optimal Access Privacy on Outsourced Storage," in CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
39
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: practical access pattern privacy and correctness on untrusted storage," in CCS, 2008.
-
(2008)
CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
40
-
-
84869453208
-
PrivateFS: A Parallel Oblivious File System
-
P. Williams, R. Sion, and A. Tomescu, "PrivateFS: A Parallel Oblivious File System," in CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
-
41
-
-
80755187785
-
Predictive Mitigation of Timing Channels in Interactive Systems
-
D. Zhang, A. Askarov, and A. C. Myers, "Predictive Mitigation of Timing Channels in Interactive Systems," in CCS, 2011.
-
(2011)
CCS
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
42
-
-
12844260675
-
HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus
-
X. Zhuang, T. Zhang, and S. Pande, "HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus," in ASPLOS, 2004.
-
(2004)
ASPLOS
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
|