Page 168 - 《软件学报》2020年第10期
P. 168

3144                                  Journal of Software  软件学报 Vol.31, No.10, October 2020

          [90]    Shinagawa T, Eiraku H, Tanimoto K, Omote K, Hasegawa S, Horie T, Hirano M, Kourai K, Oyama Y, Kawai E, Kono K, Chiba
              S, Shinjo Y, Kato K. Bitvisor: A thin hypervisor for enforcing I/O device security. In: Proc. of the 5th ACM SIGPLAN/SIGOPS
              Int’l Conf. on Virtual Execution Environments (VEE). ACM, 2009. 121–130. [doi: 10.1145/1508293.1508311]
          [91]    Skillen A, Barrera D, Van Oorschot PC. Deadbolt: Locking down Android disk encryption. In: Proc. of the 3rd ACM Workshop
              on Security and Privacy in Smartphones and Mobile Devices (SPSM). ACM, 2013. 3–14. [doi: 10.1145/2516760.2516771]
          [92]    Huber M, Horsch J, Wessel S. Protecting suspended devices from memory attacks. In: Proc. of the 10th European Workshop on
              Systems Security (EuroSec). ACM, 2017,10:1–6. [doi: 10.1145/3065913.3065914]
          [93]    Huber M, Horsch J, Ali J, Wessel S. Freeze and crypt: Linux kernel support for main memory encryption. Computers & Security,
              2019,86:420–436. [doi: 10.1016/j.cose.2018.08.011]
          [94]    Zhao LY, Mannan M. Hypnoguard: protecting secrets across sleep-wake cycles. In: Proc. of the 23rd ACM SIGSAC Conf. on
              Computer and Communications Security (CCS). ACM, 2016. 945–957. [doi: 10.1145/2976749.2978372]
          [95]    Peterson PAH. Cryptkeeper: Improving security with encrypted RAM. In: Proc. of the 9th IEEE Int’l Conf. on Technologies for
              Homeland Security (HST). IEEE, 2010. 120–126. [doi: 10.1109/THS.2010.5655081]
          [96]    Götzfried J, Müller T, Drescher G, Nürnberger S, Backes M. RamCrypt: Kernel-based address space encryption for user-mode
              processes. In: Proc. of the 11th ACM Asia Conf. on Computer and Communications Security (ASIACCS). ACM, 2016. 919–924.
              [doi: 10.1145/2897845.2897924]
          [97]    Cao C, Guan L, Zhang N, Gao N, Lin JQ, Luo B, Liu P, Xiang J, Lou WJ. CryptMe: Data leakage prevention for unmodified
              programs on ARM devices. In: Proc. of the 21st Int’l Symp. on Research in Attacks, Intrusions, and Defenses (RAID). Cham:
              Springer-Verlag, 2018. 380–400. [doi: 10.1007/978-3-030-00470-5_18]
          [98]    Guan L, Cao C, Zhu SC, Lin JQ, Liu P, Xia YB, Luo B. Protecting mobile devices from physical memory attacks with targeted
              encryption. In: Proc. of the 12th Conf. on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, 2019. 34–44.
              [doi: 10.1145/3317549.3319721]
          [99]    Enck W,  Gilbert P,  Chun BG,  Cox  LP, Jung J,  McDaniel P, Sheth  AN.  TaintDroid: An  information-flow tracking system  for
              realtime privacy  monitoring on smartphones. In:  Proc. of  the 9th  USENIX Symp. on Operating Systems  Design  and
              Implementation (OSDI). USENIX Association, 2010. 393–407. [doi: 10.5555/1924943.1924971]
         [100]    ARM Ltd. The ARM  system  memory management  units.  2019.  https://developer.arm.com/ip-products/system-ip/system-
              controllers/system-memory-management-unit
         [101]    Chu DW, Wang YW, Lei LG, Li YC, Jing JW, Sun K. OCRAM-assisted sensitive data protection on ARM-based platform. In:
              Proc. of the 24th European Symp. on Research in Computer Security (ESORICS). Cham: Springer-Verlag, 2019. 412–438. [doi:
              10.1007/978-3-030-29962-0_20]
         [102]    Hong D, Bathen LAD, Lim  SS, Dutt N. DynaPoMP: Dynamic  policy-driven memory  protection  for  SPM-based embedded
              systems. In:  Proc. of the 6th Workshop on  Embedded Systems Security (WESS).  ACM, 2011,5:1–10. [doi:  10.1145/2072274.
              2072279]
         [103]    Zhang N, Sun K, Lou WJ, Hou YT. Case: Cache-assisted secure execution on ARM processors. In: Proc. of the 37th IEEE Symp.
              on Security and Privacy (SP). IEEE, 2016. 72–90. [doi: 10.1109/SP.2016.13]
         [104]    Chen X, Dick RP, Choudhary A. Operating system controlled processor-memory bus encryption. In: Proc. of the 11th Design,
              Automation and Test in Europe (DATE). IEEE, 2008. 1154–1159. [doi: 10.1109/DATE.2008.4484834]
         [105]    Chen Y, Khandaker M, Wang Z. Secure in-cache execution. In: Proc. of the 20th Int’l Symp. on Research in Attacks, Intrusions,
              and Defenses (RAID). Cham: Springer-Verlag, 2017. 381–402. [doi: 10.1007/978-3-319-66332-6_17]
         [106]    Yun MH, Zhong L. Ginseng: Keeping secrets in registers when you distrust the operating system. In: Proc. of the 26th Annual
              Network and Distributed System Security Symp. (NDSS). Internet Society, 2019. [doi: 10.14722/ndss.2019.23327]
         [107]    Papadopoulos  P, Vasiliadis  G, Christou G, Markatos E,  Ioannidis  S. No  sugar  but all the  taste! Memory encryption without
              architectural support. In: Proc. of the 22nd  European Symp. on  Research in  Computer Security (ESORICS).  Cham: Springer-
              Verlag, 2017. 362–380. [doi: 10.1007/978-3-319-66399-9_20]
         [108]    Seitzer M, Gruhn M, Müller T. A bytecode interpreter for secure program execution in untrusted main memory. In: Proc. of the
              20th European Symp. on Research in Computer Security (ESORICS). Cham: Springer-Verlag, 2015. 376–395. [doi: 10.1007/978-
              3-319-24177-7_19]
   163   164   165   166   167   168   169   170   171   172   173