作者
Jun Yang, Youtao Zhang, Lan Gao
发表日期
2003/12/3
研讨会论文
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
页码范围
351
出版商
IEEE Computer Society
简介
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation is that other than the processor, any component is vulnerable to security attacks. Recently, an execution only memory (XOM) architecture has been proposed to support copy and tamper resistant software by D. Lie et al. (2000), D. Lie et al. (2003) and T. Gilmont et al. (1999). In this design, the program and data are stored in encrypted format outside the CPU boundary. The decryption is carried after they are fetched from memory, and before they are used by the CPU. As a result, the lengthened critical path causes a serious performance degradation. In this paper, we present an innovative technique in which the cryptography computation is shifted off from the memory access critical path. We propose to use a different encryption scheme …
引用总数
20022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024121622191415201016667851198661254
学术搜索中的文章
J Yang, Y Zhang, L Gao - Proceedings. 36th Annual IEEE/ACM International …, 2003