Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key obser-vation is that other than the processor, any component is vulnerable to security attacks. Recently, an execution only memory (XOM) architecture has been proposed to support copy and tamper resistant software [18, 17, 13]. In this de-sign, the program and data are stored in encrypted format outside the CPU boundary. The decryption is carried after they are fetched from memory, and before they are used by the CPU. As a result, the lengthened critical path causes a serious performance degradation. In this paper, we present an innovative technique in which the cryptography c...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Recently there is a growing interest in both the architecture and the security community to create a...