Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)
DOI: 10.1109/secpri.2003.1199335
|View full text |Cite
|
Sign up to set email alerts
|

Specifying and verifying hardware for tamper-resistant software

Abstract: We specify a hardware architecture that supports tamper-resistant software by identifying an "idealized" model, which

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
68
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(68 citation statements)
references
References 21 publications
0
68
0
Order By: Relevance
“…Step [1], row 2 and row 4 are modified causing contention and evictions from set 1 and 3 respectively. Consequently, an adversary can learn the identifier of the row being updated during each row operation by monitoring the address space in which any updates take place, and then linking it back to the row number.…”
Section: Attacking Mceliece Public-key Cryptosystemmentioning
confidence: 99%
See 1 more Smart Citation
“…Step [1], row 2 and row 4 are modified causing contention and evictions from set 1 and 3 respectively. Consequently, an adversary can learn the identifier of the row being updated during each row operation by monitoring the address space in which any updates take place, and then linking it back to the row number.…”
Section: Attacking Mceliece Public-key Cryptosystemmentioning
confidence: 99%
“…Numerous secure processor architectures (e.g., XOM [1], [2], TPM+TXT [3], Aegis [4], Intel-SGX [5] etc.) have been proposed for preserving data confidentiality and integrity during a remote secure computation.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, the closest related research project is the work of David Lie et al They have used a model checker (Murϕ) to model and verify the eXecute Only Memory (XOM) architecture [16]. The XOM architecture allows an application to run in a secure compartment wherein its data are protected against other applications and even a malicious operating system.…”
Section: Related Workmentioning
confidence: 99%
“…All off-chip memory transactions have to pass through encryption and decryption processes providing a high level of security. Though the original proposal was susceptible to replay attacks, this problem can be addressed with relatively minor changes [25]. However, the main problem with XOM is its significant performance overhead since lengthy encryption and decryption processes reside on the critical path.…”
Section: Related Workmentioning
confidence: 99%