Physical unclonable functions for device authentication and secret key generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS
kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel …
kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel …
Aegis: A single-chip secure processor
GE Suh, CW O'Donnell… - IEEE Design & Test of …, 2007 - ieeexplore.ieee.org
In this article, we introduce a single-chip secure processor called Aegis. In addition to
supporting mechanisms to authenticate the platform and software, our processor …
supporting mechanisms to authenticate the platform and software, our processor …
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems
T Huffmire, B Brotherton, G Wang… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
Blurring the line between software and hardware, reconfigurable devices strike a balance
between the raw high speed of custom silicon and the post-fabrication flexibility of general …
between the raw high speed of custom silicon and the post-fabrication flexibility of general …
Batch pairing delegation
Pairing-based cryptography (PBC) has enabled the construction of many cryptographic
protocols. However, there are scenarios when PBC is too heavyweight to use, such as when …
protocols. However, there are scenarios when PBC is too heavyweight to use, such as when …
Offline untrusted storage with immediate detection of forking and replay attacks
M Van Dijk, J Rhodes, LFG Sarmenta… - Proceedings of the 2007 …, 2007 - dl.acm.org
We address the problemof using an untrusted server with only a trusted timestamping device
(TTD) to provide trusted storage for a large number of clients, where each client may own …
(TTD) to provide trusted storage for a large number of clients, where each client may own …
Trusted hardware: Can it be trustworthy?
CE Irvine, K Levitt - Proceedings of the 44th Annual Design Automation …, 2007 - dl.acm.org
Processing and storage of confidential or critical information is an every day occurrence in
computing systems. The trustworthiness of computing devices has become an important …
computing systems. The trustworthiness of computing devices has become an important …
Controlled physical random functions
The cryptographic protocols that we use in everyday life rely on the secure storage of keys in
consumer devices. Protecting these keys from invasive attackers, who open a device to steal …
consumer devices. Protecting these keys from invasive attackers, who open a device to steal …
People-centric urban sensing: Security challenges for the new paradigm
We study the security challenges that arise in\emph {people-centric urban sensing}, a new
sensor-networking paradigm that leverages humans as part of the sensing infrastructure …
sensor-networking paradigm that leverages humans as part of the sensing infrastructure …
Used trusted co-servers to enhance security of web interaction
DM Chess, J Dyer, N Itoi, J Kravitz, ER Palmer… - US Patent …, 2007 - Google Patents
(22) Filed: Sep. 15, 2000 1,, and then said co-server carries out N functions: Fl.(i0... In)
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …