Memory encryption: A survey of existing techniques

M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …

Memory encryption for general-purpose processors

S Gueron - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Intel's Software Guard Extensions allows general-purpose computing platforms to run
software in a trustworthy manner and securely handle encrypted data. To satisfy the …

[PDF][PDF] AMD memory encryption

D Kaplan, J Powell, T Woller - White paper, 2016 - amd.com
The need for practical security in modern computing systems is greater than ever. The
increase in system complexity, growth of the cloud, and advent of new technologies are all …

Beyond full disk encryption: Protection on security-enhanced commodity processors

M Henson, S Taylor - Applied Cryptography and Network Security: 11th …, 2013 - Springer
Modern computer systems exhibit a major weakness in that code and data are stored in the
clear, unencrypted, within random access memory. As a result, numerous vulnerabilities …

{AMD} x86 Memory Encryption Technologies

D Kaplan - 2016 - usenix.org
This talk will introduce the audience to two new x86 ISA features developed by AMD which
will provide new security enhancements by leveraging integrated memory encryption …

Improving memory encryption performance in secure processors

J Yang, L Gao, Y Zhang - ieee Transactions on Computers, 2005 - ieeexplore.ieee.org
Due to the widespread software piracy and virus attacks, significant efforts have been made
to improve security for computer systems. For stand-alone computers, a key observation is …

Improving cost, performance, and security of memory encryption and authentication

C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
Protection from hardware attacks such as snoopers and mod chips has been receiving
increasing attention in computer architecture. This paper presents a new combined memory …

A comparison study of intel SGX and AMD memory encryption technology

S Mofrad, F Zhang, S Lu, W Shi - … of the 7th International Workshop on …, 2018 - dl.acm.org
Hardware-assisted trusted execution environments are secure isolation technologies that
have been engineered to serve as efficient defense mechanisms to provide a security …

{TRESOR} Runs Encryption Securely Outside {RAM}

T Müller, FC Freiling, A Dewald - 20th USENIX Security Symposium …, 2011 - usenix.org
Current disk encryption techniques store necessary keys in RAM and are therefore
susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We …

Hardware mechanisms for memory authentication: A survey of existing techniques and engines

R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
Trusted computing platforms aim to provide trust in computations performed by sensitive
applications. Verifying the integrity of memory contents is a crucial security service that these …