共 12 条
[1]
Abu Zubair K., 2019, INT S COMP ARCH ISCA
[2]
Awad A., 2019, INT S COMP ARCH ISCA
[3]
ObfusMem: A Low-Overhead Access Obfuscation for Trusted Memories
[J].
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017),
2017,
:107-119
[5]
Chhabra S, 2011, ISCA 2011: PROCEEDINGS OF THE 38TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, P177, DOI 10.1145/2024723.2000086
[6]
Gueron Shay., 2016, IACR CRYPTOL EPRINT, P204
[7]
Crash Consistency in Encrypted Non-Volatile Main Memory Systems
[J].
2018 24TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA),
2018,
:310-323
[8]
Micron, BREAKTHR NONV MEM TE
[9]
Using address independent seed encryption and Bonsai Merkle Trees to make secure processors OS- and performance-friendly
[J].
MICRO-40: PROCEEDINGS OF THE 40TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE,
2007,
:183-+
[10]
Yan CY, 2006, CONF PROC INT SYMP C, P179, DOI 10.1145/1150019.1136502