Information technology's impact on the accounting system
This research aims to measure the effect of information technology (IT) on the accounting
system IT helps to improve the quality and performance of accounting transactions in a …
system IT helps to improve the quality and performance of accounting transactions in a …
Cryptographic processors-a survey
R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …
usage policies. Their origins lie with military cipher machines and PIN processing in banking …
Intel SGX explained
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …
computationally weak client to “outsource” the computation of a function F on various …
Physical unclonable functions for device authentication and secret key generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
Silicon physical random functions
We introduce the notion of a Physical Random Function (PUF). We argue that a complex
integrated circuit can be viewed as a silicon PUF and describe a technique to identify and …
integrated circuit can be viewed as a silicon PUF and describe a technique to identify and …
Flicker: An execution infrastructure for TCB minimization
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …
SWATT: Software-based attestation for embedded devices
A Seshadri, A Perrig, L Van Doorn… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
We expect a future where we are surrounded by embedded devices, ranging from Java-
enabled cell phones to sensor networks and smart appliances. An adversary can …
enabled cell phones to sensor networks and smart appliances. An adversary can …