HIDE: an infrastructure for efficiently protecting information leakage on the address bus
暂无分享,去创建一个
[1] Brad Calder,et al. Automatically characterizing large scale program behavior , 2002, ASPLOS X.
[2] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[3] Julian R. Ullmann,et al. An Algorithm for Subgraph Isomorphism , 1976, J. ACM.
[4] Andrew Huang,et al. Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.
[5] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[6] Markus G. Kuhn,et al. Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.
[7] Donald E. Knuth,et al. The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[10] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[11] Tao Zhang,et al. Leakage-proof program partitioning , 2002, CASES '02.
[12] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[13] M. Kuhn. The TrustNo 1 Cryptoprocessor Concept , 1997 .
[14] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[15] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[16] Bruce Schneier,et al. Side Channel Cryptanalysis of Product Ciphers , 1998, J. Comput. Secur..
[17] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[18] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[19] G. Edward Suh,et al. Efficient Memory Integrity Verification and Encryption for Secure Processors , 2003, MICRO.
[20] Tao Zhang,et al. Tamper-resistant whole program partitioning , 2003, LCTES.
[21] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[22] Jun Yang,et al. Fast Secure Processor for Inhibiting Software Piracy and Tampering , 2003, MICRO.
[23] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.