Cryptographic processors-a survey

R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …

Building a high-performance, programmable secure coprocessor

SW Smith, S Weingart - Computer Networks, 1999 - Elsevier
Secure coprocessors enable secure distributed applications by providing safe havens
where an application program can execute (and accumulate state), free of observation and …

Formal abstractions for attested execution secure processors

R Pass, E Shi, F Tramer - … in Cryptology–EUROCRYPT 2017: 36th Annual …, 2017 - Springer
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …

Bootstrapping trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Towards seamless mobility on pervasive hardware

M Satyanarayanan, MA Kozuch, CJ Helfrich… - Pervasive and Mobile …, 2005 - Elsevier
Preserving one's uniquely customized computing environment as one moves to different
locations is an enduring challenge in mobile computing. We examine why this capability is …

[图书][B] Trusted computing platforms: design and applications

SW Smith - 2013 - books.google.com
How can one trust computation taking place at a remote site, particularly if a party at that site
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …

System and method for validating program execution at run-time

K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …

[图书][B] Bootstrapping trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

System and method for validating program execution at run-time using control flow signatures

K Ghose - US Patent 8,782,435, 2014 - Google Patents
Ostrolenk Faber LLP (57) ABSTRACT A processor comprising: an instruction processing
pipeline, configured to receive a sequence of instructions for execution, said sequence …

Classification of malicious host threats in mobile agent computing

E Bierman, E Cloete - Proceedings of the 2002 annual research …, 2002 - dl.acm.org
Full-scale adoption of mobile agent technology in untrustworthy network environments, such
as the Internet, has been delayed by several security complexities [Montanari, 2001] …