2018
DOI: 10.1109/tdsc.2016.2631548
|View full text |Cite
|
Sign up to set email alerts
|

Copker: A Cryptographic Engine Against Cold-Boot Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…It provided a secure and isolated execution environment between guest TEEs. For physical attacks, Guan et al proposed Copker [23], an encryption engine implemented inside the CPU, and they proved that it provides a secure service against cold boot attacks. In [24], the authors proposed Loop-Amnesia, a disk encryption technology that eliminated cold boot attacks.…”
Section: Software Enhancementsmentioning
confidence: 99%
“…It provided a secure and isolated execution environment between guest TEEs. For physical attacks, Guan et al proposed Copker [23], an encryption engine implemented inside the CPU, and they proved that it provides a secure service against cold boot attacks. In [24], the authors proposed Loop-Amnesia, a disk encryption technology that eliminated cold boot attacks.…”
Section: Software Enhancementsmentioning
confidence: 99%
“…Let us illustrate it with the example discussed in Introduction section. Say, the input is the DOI 10.1109/TDSC.2016.2631548 identifying the paper titled "Copker: a cryptographic engine against cold-boot attacks" (Guan et al 2018). The output is a ranked list showing the surrogates and the links where the OA copies are available:…”
Section: Input and Outputmentioning
confidence: 99%
“…Example 1 (Conference paper as a proxy for a journal paper) The paper titled "Copker -Computing with Private Keys without RAM" published in the Proceedings of Network and Distributed System Security Symposium (NDSS), 2014 (Guan et al 2014) is freely available on the web. 13 The authors later extended it into a paper titled "Copker -A Cryptographic Engine Against Cold-Boot Attacks" published in IEEE Transactions on Dependable and Secure Computing in 2018 (Guan et al 2018). The journal version currently does not have a free copy on the web.…”
Section: Introductionmentioning
confidence: 99%
“…Additional recent work related to bootloader attacks include the works of Guan et al 11 and Redini et al, 12 whereas attacks on FDE systems are discussed in other works. [13][14][15] Both bootloader and FDE attacks in the context of IoT security are considered in the work of Johnston et al 16 Redini et al 12 have developed a taint analysis system, BootStomp, which is designed to find potential security flaws in bootloaders.…”
Section: Bootloader Attacks and Prior Workmentioning
confidence: 99%
“…Guan et al present a cryptographic engine, Copker, which they have developed. Copker performs cryptographic operations within the CPU so that no “plaintext‐sensitive” data is stored in RAM.…”
Section: Introductionmentioning
confidence: 99%