We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software privacy. The memory management unit which provides multitasking and virtual memory support is extended and given a third purpose: to supply strong hardware security support for the software layer. The principle of this enhanced device, that we call a Security Management Unit (or SMU), is based on ciphered program execution and access control. It is composed of a pipelined block ciphering/deciphering unit, an infernal permanent memory and logic control, whose interaction is explained in this pape
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
We propose "secret-protected (SP)" architecture to enable secure and convenient protection...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
We propose an hardware solution to several security problems that are difficult to solve on classica...
The acquisition of volatile memory of running systems has become a prominent and essential procedure...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
The hardware security of embedded systems is raising more and more concerns in numerous safety-criti...
The acquisition of volatile memory of running systems has become a prominent and essential procedure...
Security is a system-wide problem which must include software solutions for update capability and ap...
The increasing need for security has caused system designers to consider placing some security suppo...
The security level in existing workstation and server systems is not sufficient for most application...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
With the increasing concern of the security on high performance multiprocessor enterprise servers, m...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
We propose "secret-protected (SP)" architecture to enable secure and convenient protection...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
We propose an hardware solution to several security problems that are difficult to solve on classica...
The acquisition of volatile memory of running systems has become a prominent and essential procedure...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
The hardware security of embedded systems is raising more and more concerns in numerous safety-criti...
The acquisition of volatile memory of running systems has become a prominent and essential procedure...
Security is a system-wide problem which must include software solutions for update capability and ap...
The increasing need for security has caused system designers to consider placing some security suppo...
The security level in existing workstation and server systems is not sufficient for most application...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
With the increasing concern of the security on high performance multiprocessor enterprise servers, m...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
We propose "secret-protected (SP)" architecture to enable secure and convenient protection...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...