Sciweavers

563 search results - page 109 / 113
» Reconfigurable trusted computing in hardware
Sort
View
EUROSYS
2010
ACM
14 years 16 days ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 7 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
IFIP
2009
Springer
13 years 5 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
12 years 11 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
14 years 2 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...