Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors.

SW Smith, V Austel - USENIX Workshop on Electronic Commerce, 1998 - usenix.org
Secure coprocessors provide a foundation for many exciting electronic commerce
applications, as previous work [Yee94, YeTy95] has demonstrated. As our recent work …

[图书][B] Trusted computing platforms: design and applications

SW Smith - 2013 - books.google.com
How can one trust computation taking place at a remote site, particularly if a party at that site
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …

Nexus: a new operating system for trustworthy computing

A Shieh, D Williams, EG Sirer… - Proceedings of the …, 2005 - dl.acm.org
Tamper-proof coprocessors for secure computing are poised to become a standard
hardware feature on future computers. Such hardware provides the primitives necessary to …

[PDF][PDF] Application support architecture for a high-performance, programmable secure coprocessor

J Dyer, R Perez, S Smith… - 22nd National Information …, 1999 - cs.dartmouth.edu
A “secure system” should be secure—but should also be a system that achieves some
particular functionality. A family of secure systems that our group has been investigating …

Building a high-performance, programmable secure coprocessor

SW Smith, S Weingart - Computer Networks, 1999 - Elsevier
Secure coprocessors enable secure distributed applications by providing safe havens
where an application program can execute (and accumulate state), free of observation and …

Implementing an untrusted operating system on trusted hardware

D Lie, CA Thekkath, M Horowitz - … of the nineteenth ACM symposium on …, 2003 - dl.acm.org
Recently, there has been considerable interest in providing" trusted computing platforms"
using hardware~---~ TCPA and Palladium being the most publicly visible examples. In this …

Trustworthy computing under resource constraints with the DOWN policy

M Ramkumar - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use
today, albeit limited predominantly to scenarios where constraints on cost is not a serious …

Using a high-performance, programmable secure coprocessor

SW Smith, ER Palmer, S Weingart - … , FC'98 Anguilla, British West Indies …, 1998 - Springer
Unsecure computational environments threaten many financial cryptography
implementations, and other sensitive computation. High-performance secure coprocessors …

Outbound authentication for programmable secure coprocessors

SW Smith - Computer Security—ESORICS 2002: 7th European …, 2002 - Springer
A programmable secure coprocessor platform can help solve many security problems in
distributed computing. However, these solutions usually require that coprocessor …

Surveying secure processors

R Kannavara, NG Bourbakis - IEEE potentials, 2009 - ieeexplore.ieee.org
Secure computing is gaining importance as computing capability is increasingly becoming
distributed and information is available everywhere. Prevention of piracy and digital rights …