共 25 条
[1]
Apple Inc, 2019, iOS Security-iOS 12.3
[2]
Blass EO, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P71
[3]
Corner Mark D., 2002, P 8 ANN INT C MOB CO
[4]
Protecting applications with transient authentication
[J].
PROCEEDINGS OF MOBISYS 2003,
2003,
:57-70
[5]
CryptoPage: an efficient secure architecture with memory encryption, integrity and information leakage protection
[J].
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2006,
:483-+
[6]
HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
[J].
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016),
2016,
:79-87
[7]
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:919-924
[8]
Gotzfried Johannes, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P161, DOI 10.1109/ARES.2013.23
[9]
Gotzfried J., 2014, JOWUA, V5, P84
[10]
Copker: Computing with Private Keys without RAM
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,