Methods and system for use in network management of content

AB Lamkin, GI Gewickey, TR Collart - US Patent 7,689,510, 2010 - Google Patents
US7689510B2 - Methods and system for use in network management of content - Google
Patents US7689510B2 - Methods and system for use in network management of content …

Methods and systems for use in network management of content

AB Lamkin, GI Gewickey, TR Collart - US Patent 7,779,097, 2010 - Google Patents
The present embodiments provide methods, systems and apparatuses for use in managing
content on at least a local network. Some embodiments provide a method for use in …

Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly

B Rogers, S Chhabra, M Prvulovic… - 40th Annual IEEE/ACM …, 2007 - ieeexplore.ieee.org
In today's digital world, computer security issues have become increasingly important. In
particular, researchers have proposed designs for secure processors which utilize hardware …

Improving cost, performance, and security of memory encryption and authentication

C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
Protection from hardware attacks such as snoopers and mod chips has been receiving
increasing attention in computer architecture. This paper presents a new combined memory …

A practical methodology for measuring the side-channel signal available to the attacker for instruction-level events

R Callan, A Zajic, M Prvulovic - 2014 47th Annual IEEE/ACM …, 2014 - ieeexplore.ieee.org
This paper presents a new metric, which we call Signal Available to Attacker (SAVAT), that
measures the side channel signal created by a specific single-instruction difference in …

Morphable counters: Enabling compact integrity trees for low-overhead secure memories

G Saileshwar, PJ Nair, P Ramrakhyani… - 2018 51st Annual …, 2018 - ieeexplore.ieee.org
Securing off-chip main memory is essential for protection from adversaries with physical
access to systems. However, current secure-memory designs incur considerable …

Crash consistency in encrypted non-volatile main memory systems

S Liu, A Kolli, J Ren, S Khan - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Non-Volatile Main Memory (NVMM) systems provide high performance by directly
manipulating persistent data in-memory, but require crash consistency support to recover …

AEGIS: A single-chip secure processor

GE Suh, CW O'Donnell, S Devadas - Information Security Technical Report, 2005 - Elsevier
This article presents the AEGIS secure processor architecture, which enables new
applications by ensuring private and authentic program execution even in the face of …

Invisimem: Smart memory defenses for memory bus side channel

S Aga, S Narayanasamy - ACM SIGARCH Computer Architecture News, 2017 - dl.acm.org
A practically feasible low-overhead hardware design that provides strong defenses against
memory bus side channel remains elusive. This paper observes that smart memory, memory …

SecureME: a hardware-software approach to full system security

S Chhabra, B Rogers, Y Solihin… - Proceedings of the …, 2011 - dl.acm.org
With computing increasingly becoming more dispersed, relying on mobile devices,
distributed computing, cloud computing, etc. there is an increasing threat from adversaries …