2009
DOI: 10.1145/1498690.1498691
|View full text |Cite
|
Sign up to set email alerts
|

Making secure processors OS- and performance-friendly

Abstract: In today's digital world, computer security issues have become increasingly important. In particular, researchers have proposed designs for secure processors that utilize hardware-based memory encryption and integrity verification to protect the privacy and integrity of computation even from sophisticated physical attacks. However, currently proposed schemes remain hampered by problems that make them impractical for use in today's computer systems: lack of virtual memory and Inter-Process Communication support… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 35 publications
0
17
0
Order By: Relevance
“…Given the privacy issues with PRAM, we opt to use the counter mode encryption for its proved security and high performance [3] and assume that the secret keys are inside processors. Figure 1 shows the counter-mode encryption proposed for secure processors [3]. The counter data block is composed of a counter, two address offsets and a logical page identifier (LPID).…”
Section: Privacymentioning
confidence: 99%
See 4 more Smart Citations
“…Given the privacy issues with PRAM, we opt to use the counter mode encryption for its proved security and high performance [3] and assume that the secret keys are inside processors. Figure 1 shows the counter-mode encryption proposed for secure processors [3]. The counter data block is composed of a counter, two address offsets and a logical page identifier (LPID).…”
Section: Privacymentioning
confidence: 99%
“…As a result, when a counter overflows, a new unique LPID is generated and the whole page would be re-encrypted to ensure uniqueness of counter data blocks [3]. The performance advantage of the counter-mode encryption is that the block cipher (i.e., encryption) latency can be overlapped with the latency of fetching the encrypted data block.…”
Section: Privacymentioning
confidence: 99%
See 3 more Smart Citations