作者
Sean W Smith, Steve Weingart
发表日期
1999/4/23
期刊
Computer Networks
卷号
31
期号
8
页码范围
831-860
出版商
Elsevier
简介
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can execute (and accumulate state), free of observation and interference by an adversary with direct physical access to the device. However, for these coprocessors to be effective, participants in such applications must be able to verify that they are interacting with an authentic program on an authentic, untampered device. Furthermore, secure coprocessors that support general-purpose computation and will be manufactured and distributed as commercial products must provide these core sanctuary and authentication properties while also meeting many additional challenges, including: This paper summarizes the hardware, software, and cryptographic architecture we developed to address these problems. Furthermore, with our colleagues, we have implemented this solution, into a commercially …
引用总数
19981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202467112623282829263527282716242934202015154144541