Filters








103 Hits in 5.6 sec

A Cache Design for a Security Architecture for Microprocessors (SAM) [chapter]

Jörg Platte, Edwin Naroska, Kai Grundmann
2006 Lecture Notes in Computer Science  
In this paper we present a cache design for a secure combined hardware and software architecture called SAM.  ...  Additionally, the cache has to consider different memory views and protection levels as well as support for protected shared memory, a key feature of SAM.  ...  Conclusion In this work we presented a cache design suitable for the SAM architecture.  ... 
doi:10.1007/11682127_31 fatcat:jxhusgv2bfb6pdzkkuay7xummq

IoT enabled Smart Fog Computing for Vehicular Traffic Control

Akashdeep Bhardwaj, Sam Goundar
2018 EAI Endorsed Transactions on Internet of Things  
INTRODUCTION: Internet was initially designed to connect web sites and portals with data packets flowing over the networks for communications at corporate levels.  ...  METHODS: Smart Vehicular Management is viable use case for Fog and IoT technology. The authors designed and implemented two experimental setups.  ...  They can also be designed to be portable with built-in security protocols.  ... 
doi:10.4108/eai.31-10-2018.162221 fatcat:52qwq5ziczg75ncuw7w3iabflu

A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors [chapter]

Jörg Platte, Raúl Durán Díaz, Edwin Naroska
2006 Lecture Notes in Computer Science  
In this paper we revisit SAM, a security architecture for microprocessors that provides memory encryption and memory verification using hash values, including a summary of its main features and an overview  ...  We analyze the security of SAM architecture as originally proposed, pointing out some weaknesses in security and performance.  ...  SAM overview SAM provides a secure execution environment for programs based on a standard processor design and a standard operating system.  ... 
doi:10.1007/11909033_11 fatcat:azczufwq6zhcra55gmaxmpw7fe

An Operating System Design for the Security Architecture for Microprocessors [chapter]

Jörg Platte, Raúl Durán Díaz, Edwin Naroska
2006 Lecture Notes in Computer Science  
This paper presents an operating system design based on the Linux kernel for SAM.  ...  SAM is a processor extension used to protect execution of dedicated programs by preventing data disclosure and program manipulations in a multitasking environment.  ...  SAM Overview SAM provides a secure execution environment for programs based on a standard processor design and a standard operating system.  ... 
doi:10.1007/11935308_13 fatcat:wtq64d4eyjekjg64kxoyx2lqwm

Energy efficient D-TLB and data cache using semantic-aware multilateral partitioning

Hsien-Hsin S. Lee, Chinnakrishnan S. Ballapuram
2003 Proceedings of the 2003 international symposium on Low power electronics and design - ISLPED '03  
The memory subsystem, including address translations and cache accesses, consumes a major portion of the overall energy on a processor.  ...  In this paper, we address the memory energy issues by using a streamlined architectural partitioning technique that effectively reduces energy consumption in the memory subsystem without compromising performance  ...  Figure 9 evaluates the performance and energy for such a design using a 4-wide SAM machine with the configuration listed in Table 3 .  ... 
doi:10.1145/871506.871583 dblp:conf/islped/LeeB03 fatcat:uyzbk4x4bbebvbjw2djcsfni3m

Energy efficient D-TLB and data cache using semantic-aware multilateral partitioning

Hsien-Hsin S. Lee, Chinnakrishnan S. Ballapuram
2003 Proceedings of the 2003 international symposium on Low power electronics and design - ISLPED '03  
The memory subsystem, including address translations and cache accesses, consumes a major portion of the overall energy on a processor.  ...  In this paper, we address the memory energy issues by using a streamlined architectural partitioning technique that effectively reduces energy consumption in the memory subsystem without compromising performance  ...  Figure 9 evaluates the performance and energy for such a design using a 4-wide SAM machine with the configuration listed in Table 3 .  ... 
doi:10.1145/871582.871583 fatcat:5pjlj3wo5bhbnlxgtmnzs2aq24

Architectural support for hypervisor-secure virtualization

Jakub Szefer, Ruby B. Lee
2012 SIGARCH Computer Architecture News  
We also present the HyperWall architecture which achieves hypervisor-secure virtualization, using hardware to provide the protections.  ...  In this work, we present hypervisor-secure virtualization -a new research direction with the goal of protecting the guest VMs from an untrusted hypervisor.  ...  Acknowledgments We would like to thank the anonymous reviewers for their suggestions which improved this paper.  ... 
doi:10.1145/2189750.2151022 fatcat:47bl6cez4rblva2yix5hqrhemq

Architectural support for hypervisor-secure virtualization

Jakub Szefer, Ruby B. Lee
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
We also present the HyperWall architecture which achieves hypervisor-secure virtualization, using hardware to provide the protections.  ...  In this work, we present hypervisor-secure virtualization -a new research direction with the goal of protecting the guest VMs from an untrusted hypervisor.  ...  Acknowledgments We would like to thank the anonymous reviewers for their suggestions which improved this paper.  ... 
doi:10.1145/2150976.2151022 dblp:conf/asplos/SzeferL12 fatcat:hrd5bnd3zbf2hmgzrtp3jfsfti

Architectural support for hypervisor-secure virtualization

Jakub Szefer, Ruby B. Lee
2012 SIGPLAN notices  
We also present the HyperWall architecture which achieves hypervisor-secure virtualization, using hardware to provide the protections.  ...  In this work, we present hypervisor-secure virtualization -a new research direction with the goal of protecting the guest VMs from an untrusted hypervisor.  ...  Acknowledgments We would like to thank the anonymous reviewers for their suggestions which improved this paper.  ... 
doi:10.1145/2248487.2151022 fatcat:t3dyulfn4jcidjeevm7wodnhzy

Quantitative evaluation of fault propagation in a commercial cloud system

Chao Wang, Zhongchuan Fu
2020 International Journal of Distributed Sensor Networks  
In this article, we describe the implementation of a fault injection tool, which validates the dependability of a commercial cloud software stack.  ...  incorporating more and more computing density and energy into themselves; thus, fundamental research on topics such as dependability validation is needed, in order to verify the robustness of clouds for  ...  Our FBT is based on SAM, which is a full-system simulator, designed to assess the feasibility of virtualization environment.  ... 
doi:10.1177/1550147720903613 fatcat:qng4iwsnebeepkmfkeeq5i55ti

On-Device Power Analysis Across Hardware Security Domains

Colin O'Flynn, Alex Dewar
2019 Transactions on Cryptographic Hardware and Embedded Systems  
The attack is demonstrated to work both from the non-secure and secure environment on the chip, being a demonstration of a cross-domain power analysis attack.  ...  This is demonstrated on a SAML11 which contains a M23 core with a TrustZone-M implementation as the hardware security barrier. This attack requires 160 × 106 traces, or approximately 5 GByte of data.  ...  Finally, thanks to Billy Brumley for providing grammatical fixes on the initial public version of this paper.  ... 
doi:10.13154/tches.v2019.i4.126-153 dblp:journals/tches/OFlynnD19 fatcat:fgd52lc2yrcpbpyrz6mk7biomy

Hot Chips 27 Highlights

Rajeevan Amirtharajah, Behnam Robatmili
2016 IEEE Micro  
Qualcomm A Scalable Heterogeneous Multicore Architecture for ADAS Zoran Nikolic et al.  ...  Mars is a 64-core, ARMv8-compatible microprocessor targeting high-performance computing. 3 The chip integrates 64 Xiaomi cores with hardware-maintained global cache coherency.  ... 
doi:10.1109/mm.2016.30 fatcat:lfptn75qcjax5nsul3lhm5gyn4

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT [article]

Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
2020 arXiv   pre-print
As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance.  ...  This paper proposes JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol for IoT.  ...  We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper.  ... 
arXiv:1905.13369v2 fatcat:ztf2h7zw5vgglgcr3an7px64b4

Facile: a framework for attention-correlated local communication

Partridge, Newman
2003 Proceedings DARPA Information Survivability Conference and Exposition MCSA-03  
We present Facile, a software framework for supporting applications that require invisible association.  ...  Facile is independent of the physical communication layer and is designed to minimize latency and power consumption.  ...  ACKNOWLEDGEMENTS We thank Neil Spring (UW/CSE) for his comments and suggestions on early drafts of the paper and Sam Madden (UCB/CSD) for his code support.  ... 
doi:10.1109/mcsa.2003.1240775 dblp:conf/wmcsa/PartridgeNB03 fatcat:mphsmoeeifheljqa6utk3dta4e

Reflections on the REST architectural style and "principled design of the modern web architecture" (impact paper award)

Roy T. Fielding, Richard N. Taylor, Justin R. Erenkrantz, Michael M. Gorlick, Jim Whitehead, Rohit Khare, Peyman Oreizy
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
architectures and architectural design.  ...  Wide Web is designed to work and an example of how principled design, through the application of architectural styles, can impact the development and understanding of large-scale software architecture  ...  Advocacy for REST within industry has almost entirely been the work of others, especially Mark Baker, Paul Prescod, Mike Amundsen, Leonard Richardson, Sam Ruby, and the late Aaron Swartz.  ... 
doi:10.1145/3106237.3121282 dblp:conf/sigsoft/FieldingTEGWKO17 fatcat:3jy4lx53kbbqhpk4ub2aony5xu
« Previous Showing results 1 — 15 out of 103 results