Design space exploration and optimization of path oblivious RAM in secure processors
暂无分享,去创建一个
[1] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[2] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[3] Marek Chrobak,et al. A low-cost memory remapping scheme for address bus protection , 2010, J. Parallel Distributed Comput..
[4] Marek Chrobak,et al. A low-cost memory remapping scheme for address bus protection , 2006, 2006 International Conference on Parallel Architectures and Compilation Techniques (PACT).
[5] Tao Zhang,et al. HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.
[6] Srinivas Devadas,et al. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS , 2006, STC '06.
[7] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[8] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[9] Bruce Jacob,et al. DRAMSim2: A Cycle Accurate Memory System Simulator , 2011, IEEE Computer Architecture Letters.
[10] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[11] G. Edward Suh,et al. IVEC: off-chip memory integrity protection for both security and reliability , 2010, ISCA.
[12] Srinivas Devadas,et al. The Trusted Execution Module: Commodity General-Purpose Trusted Computing , 2008, CARDIS.
[13] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.