作者
Jun Yang, Lan Gao, Youtao Zhang
发表日期
2005/5
期刊
IEEE Transactions on Computers
卷号
54
期号
5
页码范围
630-640
出版商
IEEE
简介
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation is that, other than the processor, any component is vulnerable to security attacks. Recently, an execution only memory (XOM) architecture has been proposed to support copy and tamper resistant software. In this design, the program and data are stored in an encrypted format outside the CPU boundary. The decryption is carried out after they are fetched from memory and before they are used by the CPU. As a result, the lengthened critical path causes a serious performance degradation. We present an innovative technique in which the cryptography computation is shifted off from the memory access critical path. We propose using a different encryption scheme, namely, "pseudo-one-time pad" encryption, to produce the instructions and …
引用总数
20052006200720082009201020112012201320142015201620172018201920202021202220231885118648156579671211
学术搜索中的文章