Cryptographic processors-a survey
R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …
usage policies. Their origins lie with military cipher machines and PIN processing in banking …
Building a high-performance, programmable secure coprocessor
SW Smith, S Weingart - Computer Networks, 1999 - Elsevier
Secure coprocessors enable secure distributed applications by providing safe havens
where an application program can execute (and accumulate state), free of observation and …
where an application program can execute (and accumulate state), free of observation and …
Formal abstractions for attested execution secure processors
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
Bootstrapping trust in commodity computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
Towards seamless mobility on pervasive hardware
M Satyanarayanan, MA Kozuch, CJ Helfrich… - Pervasive and Mobile …, 2005 - Elsevier
Preserving one's uniquely customized computing environment as one moves to different
locations is an enduring challenge in mobile computing. We examine why this capability is …
locations is an enduring challenge in mobile computing. We examine why this capability is …
[图书][B] Trusted computing platforms: design and applications
SW Smith - 2013 - books.google.com
How can one trust computation taking place at a remote site, particularly if a party at that site
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …
System and method for validating program execution at run-time
K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …
instructions for execution from a portion of said cache memory system, an instruction …
[图书][B] Bootstrapping trust in modern computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
System and method for validating program execution at run-time using control flow signatures
K Ghose - US Patent 8,782,435, 2014 - Google Patents
Ostrolenk Faber LLP (57) ABSTRACT A processor comprising: an instruction processing
pipeline, configured to receive a sequence of instructions for execution, said sequence …
pipeline, configured to receive a sequence of instructions for execution, said sequence …
Classification of malicious host threats in mobile agent computing
E Bierman, E Cloete - Proceedings of the 2002 annual research …, 2002 - dl.acm.org
Full-scale adoption of mobile agent technology in untrustworthy network environments, such
as the Internet, has been delayed by several security complexities [Montanari, 2001] …
as the Internet, has been delayed by several security complexities [Montanari, 2001] …