Page 167 - 《软件学报》2020年第10期
P. 167
张倩颖 等:抗电路板级物理攻击的操作系统防御技术研究 3143
[68] Götzfried J, Müller T. Analysing Android’s full disk encryption feature. Journal of Wireless Mobile Networks, Ubiquitous
Computing, and Dependable Applications, 2014,5(1):84–100. [doi: 10.22667/JOWUA.2014.03.31.084]
[69] Nilsson A, Andersson M, Axelsson S. Key-hiding on the ARM platform. Digital Investigation, 2014,11:S63–S67. [doi: 10.1016/j.
diin.2014.03.008]
[70] Zhang XS, Tan YA, Xue Y, Zhang QX, Li YZ, Zhang C, Zheng J. Cryptographic key protection against FROST for mobile
devices. Cluster Computing, 2017,20(3):2393–2402. [doi: 10.1007/s10586-016-0721-3]
[71] Garmany B, Müller T. PRIME: Private RSA infrastructure for memory-less encryption. In: Proc. of the 29th Annual Computer
Security Applications Conf. (ACSAC). ACM, 2013. 149–158. [doi: 10.1145/2523649.2523656]
[72] Yang Y, Guan Z, Liu Z, Chen Z. Protecting elliptic curve cryptography against memory disclosure attacks. In: Proc. of the 16th
Int’l Conf. on Information and Communications Security (ICICS). Cham: Springer-Verlag, 2014. 49–60. [doi: 10.1007/978-3-319-
21966-0_4]
[73] Zhao Y, Lin JQ, Pan WQ, Xue C, Zheng FY, Ma ZQ. RegRSA: Using registers as buffers to resist memory disclosure attacks. In:
Proc. of the 31st IFIP Int’l Conf. on ICT Systems Security and Privacy Protection (SEC). Cham: Springer-Verlag, 2016. 293–307.
[doi: 10.1007/978-3-319-33630-5_20]
[74] Guan L, Lin JQ, Luo B, Jing JW. Copker: Computing with private keys without RAM. In: Proc. of the 21st Annual Network and
Distributed System Security Symp. (NDSS). Internet Society, 2014. [doi: 10.14722/ndss.2014.23125]
[75] Guan L, Lin JQ, Luo B, Jing JW, Wang J. Protecting private keys against memory disclosure attacks using hardware transactional
memory. In: Proc. of the 36th IEEE Symp. on Security and Privacy (SP). IEEE, 2015. 3–19. [doi: 10.1109/SP.2015.8]
[76] Vasiliadis G, Athanasopoulos E, Polychronakis M, Ioannidis S. PixelVault: Using GPUs for securing cryptographic operations. In:
Proc. of the 21st ACM SIGSAC Conf. on Computer and Communications Security (CCS). ACM, 2014. 1131–1142. [doi: 10.1145/
2660267.2660316]
[77] Gueron S. Intel® Advanced Encryption Standard (AES) new instructions set. Intel Corporation. 2010. https://www.intel.com.bo/
content/dam/doc/white-paper/advanced-encryption-standard-new-instructions-set-paper.pdf
[78] Gueron S. Intel’s new AES instructions for enhanced performance and security. In: Proc. of the 16th Int’l Workshop on Fast
Software Encryption (FSE). Berlin, Heidelberg: Springer-Verlag, 2009. 51–66. [doi: 10.1007/978-3-642-03317-9_4]
[79] Ruusu J. loop-AES—file system and swap encryption package. LinuxLinks. 2018. https://www.linuxlinks.com/loop-aes
[80] Blass EO, Robertson W. TRESOR-HUNT: attacking CPU-bound encryption. In: Proc. of the 28th Annual Computer Security
Applications Conf. (ACSAC). ACM, 2012. 71–78. [doi: 10.1145/2420950.2420961]
[81] ARM Ltd. Neon. 2020. https://developer.arm.com/architectures/instruction-sets/simd-isas/neon
[82] Kaliski B. TWIRL and RSA key size. RSA Laboratories. 2003. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.77.
4447&rep=rep1&type=pdf
[83] Barker EB, Barker WC, Burr WE, Polk WT, Smid M. NIST special publication 800-57 recommendation for key management -
Part 1: General (revised). National Institute of Standards and Technology. 2006. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/
nistspecialpublication800-57p1r2006.pdf
[84] Intel Corporation. Intel® advanced vector extensions programming reference. 2011. https://software.intel.com/sites/default/files/
4f/5b/36945
[85] Mittal M, Peleg A, Weiser U. MMX™ technology architecture overview. Intel Corporation. 1996. https://software.intel.com/
sites/default/files/m/d/3/0/MMX_Manual_Tech_Overview.pdf
[86] Intel Corporation. Intel® architecture instruction set extensions programming reference— Chapter 8: Intel® transactional
synchronization extensions. 2012. https://software.intel.com/sites/default/files/m/9/2/3/41604
[87] Zhu ZT, Kim S, Rozhanski Y, Hu YG, Witchel E, Silberstein M. Understanding the security of discrete GPUs. In: Proc. of the
10th Workshop on General Purpose Processing Using GPUs (GPGPU). ACM, 2017. 1–11. [doi: 10.1145/3038228.3038233]
[88] Kwon O, Kim Y, Huh J, Yoon H. ZeroKernel: Secure context-isolated execution on commodity GPUs. IEEE Trans. on
Dependable and Secure Computing, 2019. [doi: 10.1109/TDSC.2019.2946250]
[89] Müller T, Taubmann B, Freiling FC. TreVisor: OS-independent software-based full disk encryption secure against main memory
attacks. In: Proc. of the 10th Int’l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-
Verlag, 2012. 66–83. [doi: 10.1007/978-3-642-31284-7_5]