Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors.
SW Smith, V Austel - USENIX Workshop on Electronic Commerce, 1998 - usenix.org
Secure coprocessors provide a foundation for many exciting electronic commerce
applications, as previous work [Yee94, YeTy95] has demonstrated. As our recent work …
applications, as previous work [Yee94, YeTy95] has demonstrated. As our recent work …
[图书][B] Trusted computing platforms: design and applications
SW Smith - 2013 - books.google.com
How can one trust computation taking place at a remote site, particularly if a party at that site
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …
Nexus: a new operating system for trustworthy computing
A Shieh, D Williams, EG Sirer… - Proceedings of the …, 2005 - dl.acm.org
Tamper-proof coprocessors for secure computing are poised to become a standard
hardware feature on future computers. Such hardware provides the primitives necessary to …
hardware feature on future computers. Such hardware provides the primitives necessary to …
[PDF][PDF] Application support architecture for a high-performance, programmable secure coprocessor
A “secure system” should be secure—but should also be a system that achieves some
particular functionality. A family of secure systems that our group has been investigating …
particular functionality. A family of secure systems that our group has been investigating …
Building a high-performance, programmable secure coprocessor
SW Smith, S Weingart - Computer Networks, 1999 - Elsevier
Secure coprocessors enable secure distributed applications by providing safe havens
where an application program can execute (and accumulate state), free of observation and …
where an application program can execute (and accumulate state), free of observation and …
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing" trusted computing platforms"
using hardware~---~ TCPA and Palladium being the most publicly visible examples. In this …
using hardware~---~ TCPA and Palladium being the most publicly visible examples. In this …
Trustworthy computing under resource constraints with the DOWN policy
M Ramkumar - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use
today, albeit limited predominantly to scenarios where constraints on cost is not a serious …
today, albeit limited predominantly to scenarios where constraints on cost is not a serious …
Using a high-performance, programmable secure coprocessor
Unsecure computational environments threaten many financial cryptography
implementations, and other sensitive computation. High-performance secure coprocessors …
implementations, and other sensitive computation. High-performance secure coprocessors …
Outbound authentication for programmable secure coprocessors
SW Smith - Computer Security—ESORICS 2002: 7th European …, 2002 - Springer
A programmable secure coprocessor platform can help solve many security problems in
distributed computing. However, these solutions usually require that coprocessor …
distributed computing. However, these solutions usually require that coprocessor …
Surveying secure processors
R Kannavara, NG Bourbakis - IEEE potentials, 2009 - ieeexplore.ieee.org
Secure computing is gaining importance as computing capability is increasingly becoming
distributed and information is available everywhere. Prevention of piracy and digital rights …
distributed and information is available everywhere. Prevention of piracy and digital rights …