A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Cache Design for a Security Architecture for Microprocessors (SAM)
[chapter]
2006
Lecture Notes in Computer Science
In this paper we present a cache design for a secure combined hardware and software architecture called SAM. ...
Additionally, the cache has to consider different memory views and protection levels as well as support for protected shared memory, a key feature of SAM. ...
Conclusion In this work we presented a cache design suitable for the SAM architecture. ...
doi:10.1007/11682127_31
fatcat:jxhusgv2bfb6pdzkkuay7xummq
IoT enabled Smart Fog Computing for Vehicular Traffic Control
2018
EAI Endorsed Transactions on Internet of Things
INTRODUCTION: Internet was initially designed to connect web sites and portals with data packets flowing over the networks for communications at corporate levels. ...
METHODS: Smart Vehicular Management is viable use case for Fog and IoT technology. The authors designed and implemented two experimental setups. ...
They can also be designed to be portable with built-in security protocols. ...
doi:10.4108/eai.31-10-2018.162221
fatcat:52qwq5ziczg75ncuw7w3iabflu
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
[chapter]
2006
Lecture Notes in Computer Science
In this paper we revisit SAM, a security architecture for microprocessors that provides memory encryption and memory verification using hash values, including a summary of its main features and an overview ...
We analyze the security of SAM architecture as originally proposed, pointing out some weaknesses in security and performance. ...
SAM overview SAM provides a secure execution environment for programs based on a standard processor design and a standard operating system. ...
doi:10.1007/11909033_11
fatcat:azczufwq6zhcra55gmaxmpw7fe
An Operating System Design for the Security Architecture for Microprocessors
[chapter]
2006
Lecture Notes in Computer Science
This paper presents an operating system design based on the Linux kernel for SAM. ...
SAM is a processor extension used to protect execution of dedicated programs by preventing data disclosure and program manipulations in a multitasking environment. ...
SAM Overview SAM provides a secure execution environment for programs based on a standard processor design and a standard operating system. ...
doi:10.1007/11935308_13
fatcat:wtq64d4eyjekjg64kxoyx2lqwm
Energy efficient D-TLB and data cache using semantic-aware multilateral partitioning
2003
Proceedings of the 2003 international symposium on Low power electronics and design - ISLPED '03
The memory subsystem, including address translations and cache accesses, consumes a major portion of the overall energy on a processor. ...
In this paper, we address the memory energy issues by using a streamlined architectural partitioning technique that effectively reduces energy consumption in the memory subsystem without compromising performance ...
Figure 9 evaluates the performance and energy for such a design using a 4-wide SAM machine with the configuration listed in Table 3 . ...
doi:10.1145/871506.871583
dblp:conf/islped/LeeB03
fatcat:uyzbk4x4bbebvbjw2djcsfni3m
Energy efficient D-TLB and data cache using semantic-aware multilateral partitioning
2003
Proceedings of the 2003 international symposium on Low power electronics and design - ISLPED '03
The memory subsystem, including address translations and cache accesses, consumes a major portion of the overall energy on a processor. ...
In this paper, we address the memory energy issues by using a streamlined architectural partitioning technique that effectively reduces energy consumption in the memory subsystem without compromising performance ...
Figure 9 evaluates the performance and energy for such a design using a 4-wide SAM machine with the configuration listed in Table 3 . ...
doi:10.1145/871582.871583
fatcat:5pjlj3wo5bhbnlxgtmnzs2aq24
Architectural support for hypervisor-secure virtualization
2012
SIGARCH Computer Architecture News
We also present the HyperWall architecture which achieves hypervisor-secure virtualization, using hardware to provide the protections. ...
In this work, we present hypervisor-secure virtualization -a new research direction with the goal of protecting the guest VMs from an untrusted hypervisor. ...
Acknowledgments We would like to thank the anonymous reviewers for their suggestions which improved this paper. ...
doi:10.1145/2189750.2151022
fatcat:47bl6cez4rblva2yix5hqrhemq
Architectural support for hypervisor-secure virtualization
2012
Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12
We also present the HyperWall architecture which achieves hypervisor-secure virtualization, using hardware to provide the protections. ...
In this work, we present hypervisor-secure virtualization -a new research direction with the goal of protecting the guest VMs from an untrusted hypervisor. ...
Acknowledgments We would like to thank the anonymous reviewers for their suggestions which improved this paper. ...
doi:10.1145/2150976.2151022
dblp:conf/asplos/SzeferL12
fatcat:hrd5bnd3zbf2hmgzrtp3jfsfti
Architectural support for hypervisor-secure virtualization
2012
SIGPLAN notices
We also present the HyperWall architecture which achieves hypervisor-secure virtualization, using hardware to provide the protections. ...
In this work, we present hypervisor-secure virtualization -a new research direction with the goal of protecting the guest VMs from an untrusted hypervisor. ...
Acknowledgments We would like to thank the anonymous reviewers for their suggestions which improved this paper. ...
doi:10.1145/2248487.2151022
fatcat:t3dyulfn4jcidjeevm7wodnhzy
Quantitative evaluation of fault propagation in a commercial cloud system
2020
International Journal of Distributed Sensor Networks
In this article, we describe the implementation of a fault injection tool, which validates the dependability of a commercial cloud software stack. ...
incorporating more and more computing density and energy into themselves; thus, fundamental research on topics such as dependability validation is needed, in order to verify the robustness of clouds for ...
Our FBT is based on SAM, which is a full-system simulator, designed to assess the feasibility of virtualization environment. ...
doi:10.1177/1550147720903613
fatcat:qng4iwsnebeepkmfkeeq5i55ti
On-Device Power Analysis Across Hardware Security Domains
2019
Transactions on Cryptographic Hardware and Embedded Systems
The attack is demonstrated to work both from the non-secure and secure environment on the chip, being a demonstration of a cross-domain power analysis attack. ...
This is demonstrated on a SAML11 which contains a M23 core with a TrustZone-M implementation as the hardware security barrier. This attack requires 160 × 106 traces, or approximately 5 GByte of data. ...
Finally, thanks to Billy Brumley for providing grammatical fixes on the initial public version of this paper. ...
doi:10.13154/tches.v2019.i4.126-153
dblp:journals/tches/OFlynnD19
fatcat:fgd52lc2yrcpbpyrz6mk7biomy
Hot Chips 27 Highlights
2016
IEEE Micro
Qualcomm A Scalable Heterogeneous Multicore Architecture for ADAS Zoran Nikolic et al. ...
Mars is a 64-core, ARMv8-compatible microprocessor targeting high-performance computing. 3 The chip integrates 64 Xiaomi cores with hardware-maintained global cache coherency. ...
doi:10.1109/mm.2016.30
fatcat:lfptn75qcjax5nsul3lhm5gyn4
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
[article]
2020
arXiv
pre-print
As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance. ...
This paper proposes JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol for IoT. ...
We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper. ...
arXiv:1905.13369v2
fatcat:ztf2h7zw5vgglgcr3an7px64b4
Facile: a framework for attention-correlated local communication
2003
Proceedings DARPA Information Survivability Conference and Exposition MCSA-03
We present Facile, a software framework for supporting applications that require invisible association. ...
Facile is independent of the physical communication layer and is designed to minimize latency and power consumption. ...
ACKNOWLEDGEMENTS We thank Neil Spring (UW/CSE) for his comments and suggestions on early drafts of the paper and Sam Madden (UCB/CSD) for his code support. ...
doi:10.1109/mcsa.2003.1240775
dblp:conf/wmcsa/PartridgeNB03
fatcat:mphsmoeeifheljqa6utk3dta4e
Reflections on the REST architectural style and "principled design of the modern web architecture" (impact paper award)
2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017
architectures and architectural design. ...
Wide Web is designed to work and an example of how principled design, through the application of architectural styles, can impact the development and understanding of large-scale software architecture ...
Advocacy for REST within industry has almost entirely been the work of others, especially Mark Baker, Paul Prescod, Mike Amundsen, Leonard Richardson, Sam Ruby, and the late Aaron Swartz. ...
doi:10.1145/3106237.3121282
dblp:conf/sigsoft/FieldingTEGWKO17
fatcat:3jy4lx53kbbqhpk4ub2aony5xu
« Previous
Showing results 1 — 15 out of 103 results