2006
DOI: 10.1016/j.jpdc.2006.04.011
|View full text |Cite
|
Sign up to set email alerts
|

M-TREE: A high efficiency security architecture for protecting integrity and privacy of software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Artificial immune system is a computational intelligence paradigm, which has found applications in data mine [17], scheduling [30], control [31], machine learning [13,22], security [25,19], optimization [12], and many other fields [6]. However, most studies are limited within several immune principles and models, including clonal selection [8], negative selection [20], immune network [9], and danger model [25], which are utilized independently.…”
Section: Immune Computationmentioning
confidence: 99%
“…Artificial immune system is a computational intelligence paradigm, which has found applications in data mine [17], scheduling [30], control [31], machine learning [13,22], security [25,19], optimization [12], and many other fields [6]. However, most studies are limited within several immune principles and models, including clonal selection [8], negative selection [20], immune network [9], and danger model [25], which are utilized independently.…”
Section: Immune Computationmentioning
confidence: 99%
“…Despite a number of secure processor designs have been proposed, they typically made trade-offs between security and execution efficiency. To address these shortcomings, we investigated and proposed a novel secure processor architecture called M-TREE [2] that offers a significant performance advantage without compromising security strength. The M-TREE architecture uses a novel technique called hierarchical Message Authentication Tree (MACTree) for protecting applications' integrity at a minimal performance overhead.…”
Section: Problem Statement and Approachesmentioning
confidence: 99%
“…With respect to the hash latency, we did not find the latency increase from 80ns to 160ns imposes any major performance issue in both our scheme and the CHTree scheme in general. For more research results, please refer to our publication in Journal of Parallel and Distributed Computing [2].…”
Section: Research Findingsmentioning
confidence: 99%
“…Lu et al [26] propose a similar architecture to that of Gassend, using a tree of message authentication codes (MACs). Cache block MACs are computed from hashes of the cache block, its virtual address, and an application-specific secret key.…”
Section: Related Workmentioning
confidence: 99%