Page 167 - 《软件学报》2020年第10期
P. 167

张倩颖  等:抗电路板级物理攻击的操作系统防御技术研究                                                      3143


          [68]    Götzfried J, Müller T. Analysing Android’s full  disk encryption  feature.  Journal  of  Wireless Mobile  Networks, Ubiquitous
              Computing, and Dependable Applications, 2014,5(1):84–100. [doi: 10.22667/JOWUA.2014.03.31.084]
          [69]    Nilsson A, Andersson M, Axelsson S. Key-hiding on the ARM platform. Digital Investigation, 2014,11:S63–S67. [doi: 10.1016/j.
              diin.2014.03.008]
          [70]    Zhang  XS, Tan  YA, Xue Y, Zhang QX, Li YZ, Zhang C, Zheng  J. Cryptographic  key  protection against  FROST  for mobile
              devices. Cluster Computing, 2017,20(3):2393–2402. [doi: 10.1007/s10586-016-0721-3]
          [71]    Garmany B, Müller T. PRIME: Private RSA infrastructure for memory-less encryption. In: Proc. of the 29th Annual Computer
              Security Applications Conf. (ACSAC). ACM, 2013. 149–158. [doi: 10.1145/2523649.2523656]
          [72]    Yang Y, Guan Z, Liu Z, Chen Z. Protecting elliptic curve cryptography against memory disclosure attacks. In: Proc. of the 16th
              Int’l Conf. on Information and Communications Security (ICICS). Cham: Springer-Verlag, 2014. 49–60. [doi: 10.1007/978-3-319-
              21966-0_4]
          [73]    Zhao Y, Lin JQ, Pan WQ, Xue C, Zheng FY, Ma ZQ. RegRSA: Using registers as buffers to resist memory disclosure attacks. In:
              Proc. of the 31st IFIP Int’l Conf. on ICT Systems Security and Privacy Protection (SEC). Cham: Springer-Verlag, 2016. 293–307.
              [doi: 10.1007/978-3-319-33630-5_20]
          [74]    Guan L, Lin JQ, Luo B, Jing JW. Copker: Computing with private keys without RAM. In: Proc. of the 21st Annual Network and
              Distributed System Security Symp. (NDSS). Internet Society, 2014. [doi: 10.14722/ndss.2014.23125]
          [75]    Guan L, Lin JQ, Luo B, Jing JW, Wang J. Protecting private keys against memory disclosure attacks using hardware transactional
              memory. In: Proc. of the 36th IEEE Symp. on Security and Privacy (SP). IEEE, 2015. 3–19. [doi: 10.1109/SP.2015.8]
          [76]    Vasiliadis G, Athanasopoulos E, Polychronakis M, Ioannidis S. PixelVault: Using GPUs for securing cryptographic operations. In:
              Proc. of the 21st ACM SIGSAC Conf. on Computer and Communications Security (CCS). ACM, 2014. 1131–1142. [doi: 10.1145/
              2660267.2660316]
          [77]    Gueron S. Intel® Advanced Encryption Standard (AES) new instructions set. Intel Corporation. 2010. https://www.intel.com.bo/
              content/dam/doc/white-paper/advanced-encryption-standard-new-instructions-set-paper.pdf
          [78]    Gueron  S.  Intel’s new AES instructions  for enhanced  performance and  security. In:  Proc. of  the 16th  Int’l Workshop  on  Fast
              Software Encryption (FSE). Berlin, Heidelberg: Springer-Verlag, 2009. 51–66. [doi: 10.1007/978-3-642-03317-9_4]
          [79]    Ruusu J. loop-AES—file system and swap encryption package. LinuxLinks. 2018. https://www.linuxlinks.com/loop-aes
          [80]    Blass EO, Robertson  W. TRESOR-HUNT: attacking CPU-bound encryption.  In:  Proc.  of  the  28th Annual Computer  Security
              Applications Conf. (ACSAC). ACM, 2012. 71–78. [doi: 10.1145/2420950.2420961]
          [81]    ARM Ltd. Neon. 2020. https://developer.arm.com/architectures/instruction-sets/simd-isas/neon
          [82]    Kaliski B. TWIRL and RSA  key size. RSA Laboratories.  2003.  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.77.
              4447&rep=rep1&type=pdf
          [83]    Barker EB, Barker WC, Burr WE, Polk WT, Smid M. NIST special publication 800-57 recommendation for key management -
              Part  1: General (revised). National Institute  of  Standards and Technology.  2006.  https://nvlpubs.nist.gov/nistpubs/Legacy/SP/
              nistspecialpublication800-57p1r2006.pdf
          [84]    Intel Corporation. Intel® advanced vector extensions programming reference. 2011. https://software.intel.com/sites/default/files/
              4f/5b/36945
          [85]    Mittal  M, Peleg  A,  Weiser U. MMX™  technology  architecture overview. Intel  Corporation. 1996. https://software.intel.com/
              sites/default/files/m/d/3/0/MMX_Manual_Tech_Overview.pdf
          [86]    Intel  Corporation. Intel®  architecture instruction set  extensions programming reference— Chapter 8: Intel® transactional
              synchronization extensions. 2012. https://software.intel.com/sites/default/files/m/9/2/3/41604
          [87]    Zhu ZT, Kim S, Rozhanski Y, Hu YG, Witchel E, Silberstein M. Understanding the security of discrete GPUs. In: Proc. of the
              10th Workshop on General Purpose Processing Using GPUs (GPGPU). ACM, 2017. 1–11. [doi: 10.1145/3038228.3038233]
          [88]    Kwon O, Kim Y, Huh  J,  Yoon H. ZeroKernel:  Secure context-isolated execution  on commodity GPUs. IEEE Trans.  on
              Dependable and Secure Computing, 2019. [doi: 10.1109/TDSC.2019.2946250]
          [89]    Müller T, Taubmann B, Freiling FC. TreVisor: OS-independent software-based full disk encryption secure against main memory
              attacks. In: Proc. of the 10th Int’l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-
              Verlag, 2012. 66–83. [doi: 10.1007/978-3-642-31284-7_5]
   162   163   164   165   166   167   168   169   170   171   172