S Gueron - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Intel's Software Guard Extensions allows general-purpose computing platforms to run software in a trustworthy manner and securely handle encrypted data. To satisfy the …
D Kaplan, J Powell, T Woller - White paper, 2016 - amd.com
The need for practical security in modern computing systems is greater than ever. The increase in system complexity, growth of the cloud, and advent of new technologies are all …
M Henson, S Taylor - Applied Cryptography and Network Security: 11th …, 2013 - Springer
Modern computer systems exhibit a major weakness in that code and data are stored in the clear, unencrypted, within random access memory. As a result, numerous vulnerabilities …
This talk will introduce the audience to two new x86 ISA features developed by AMD which will provide new security enhancements by leveraging integrated memory encryption …
J Yang, L Gao, Y Zhang - ieee Transactions on Computers, 2005 - ieeexplore.ieee.org
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation is …
C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory …
Hardware-assisted trusted execution environments are secure isolation technologies that have been engineered to serve as efficient defense mechanisms to provide a security …
T Müller, FC Freiling, A Dewald - 20th USENIX Security Symposium …, 2011 - usenix.org
Current disk encryption techniques store necessary keys in RAM and are therefore susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We …
R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these …