Methods and system for use in network management of content
AB Lamkin, GI Gewickey, TR Collart - US Patent 7,689,510, 2010 - Google Patents
US7689510B2 - Methods and system for use in network management of content - Google
Patents US7689510B2 - Methods and system for use in network management of content …
Patents US7689510B2 - Methods and system for use in network management of content …
Methods and systems for use in network management of content
AB Lamkin, GI Gewickey, TR Collart - US Patent 7,779,097, 2010 - Google Patents
The present embodiments provide methods, systems and apparatuses for use in managing
content on at least a local network. Some embodiments provide a method for use in …
content on at least a local network. Some embodiments provide a method for use in …
Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly
B Rogers, S Chhabra, M Prvulovic… - 40th Annual IEEE/ACM …, 2007 - ieeexplore.ieee.org
In today's digital world, computer security issues have become increasingly important. In
particular, researchers have proposed designs for secure processors which utilize hardware …
particular, researchers have proposed designs for secure processors which utilize hardware …
Improving cost, performance, and security of memory encryption and authentication
C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
Protection from hardware attacks such as snoopers and mod chips has been receiving
increasing attention in computer architecture. This paper presents a new combined memory …
increasing attention in computer architecture. This paper presents a new combined memory …
A practical methodology for measuring the side-channel signal available to the attacker for instruction-level events
This paper presents a new metric, which we call Signal Available to Attacker (SAVAT), that
measures the side channel signal created by a specific single-instruction difference in …
measures the side channel signal created by a specific single-instruction difference in …
Morphable counters: Enabling compact integrity trees for low-overhead secure memories
Securing off-chip main memory is essential for protection from adversaries with physical
access to systems. However, current secure-memory designs incur considerable …
access to systems. However, current secure-memory designs incur considerable …
Crash consistency in encrypted non-volatile main memory systems
Non-Volatile Main Memory (NVMM) systems provide high performance by directly
manipulating persistent data in-memory, but require crash consistency support to recover …
manipulating persistent data in-memory, but require crash consistency support to recover …
AEGIS: A single-chip secure processor
This article presents the AEGIS secure processor architecture, which enables new
applications by ensuring private and authentic program execution even in the face of …
applications by ensuring private and authentic program execution even in the face of …
Invisimem: Smart memory defenses for memory bus side channel
A practically feasible low-overhead hardware design that provides strong defenses against
memory bus side channel remains elusive. This paper observes that smart memory, memory …
memory bus side channel remains elusive. This paper observes that smart memory, memory …
SecureME: a hardware-software approach to full system security
S Chhabra, B Rogers, Y Solihin… - Proceedings of the …, 2011 - dl.acm.org
With computing increasingly becoming more dispersed, relying on mobile devices,
distributed computing, cloud computing, etc. there is an increasing threat from adversaries …
distributed computing, cloud computing, etc. there is an increasing threat from adversaries …