Page 168 - 《软件学报》2020年第10期
P. 168
3144 Journal of Software 软件学报 Vol.31, No.10, October 2020
[90] Shinagawa T, Eiraku H, Tanimoto K, Omote K, Hasegawa S, Horie T, Hirano M, Kourai K, Oyama Y, Kawai E, Kono K, Chiba
S, Shinjo Y, Kato K. Bitvisor: A thin hypervisor for enforcing I/O device security. In: Proc. of the 5th ACM SIGPLAN/SIGOPS
Int’l Conf. on Virtual Execution Environments (VEE). ACM, 2009. 121–130. [doi: 10.1145/1508293.1508311]
[91] Skillen A, Barrera D, Van Oorschot PC. Deadbolt: Locking down Android disk encryption. In: Proc. of the 3rd ACM Workshop
on Security and Privacy in Smartphones and Mobile Devices (SPSM). ACM, 2013. 3–14. [doi: 10.1145/2516760.2516771]
[92] Huber M, Horsch J, Wessel S. Protecting suspended devices from memory attacks. In: Proc. of the 10th European Workshop on
Systems Security (EuroSec). ACM, 2017,10:1–6. [doi: 10.1145/3065913.3065914]
[93] Huber M, Horsch J, Ali J, Wessel S. Freeze and crypt: Linux kernel support for main memory encryption. Computers & Security,
2019,86:420–436. [doi: 10.1016/j.cose.2018.08.011]
[94] Zhao LY, Mannan M. Hypnoguard: protecting secrets across sleep-wake cycles. In: Proc. of the 23rd ACM SIGSAC Conf. on
Computer and Communications Security (CCS). ACM, 2016. 945–957. [doi: 10.1145/2976749.2978372]
[95] Peterson PAH. Cryptkeeper: Improving security with encrypted RAM. In: Proc. of the 9th IEEE Int’l Conf. on Technologies for
Homeland Security (HST). IEEE, 2010. 120–126. [doi: 10.1109/THS.2010.5655081]
[96] Götzfried J, Müller T, Drescher G, Nürnberger S, Backes M. RamCrypt: Kernel-based address space encryption for user-mode
processes. In: Proc. of the 11th ACM Asia Conf. on Computer and Communications Security (ASIACCS). ACM, 2016. 919–924.
[doi: 10.1145/2897845.2897924]
[97] Cao C, Guan L, Zhang N, Gao N, Lin JQ, Luo B, Liu P, Xiang J, Lou WJ. CryptMe: Data leakage prevention for unmodified
programs on ARM devices. In: Proc. of the 21st Int’l Symp. on Research in Attacks, Intrusions, and Defenses (RAID). Cham:
Springer-Verlag, 2018. 380–400. [doi: 10.1007/978-3-030-00470-5_18]
[98] Guan L, Cao C, Zhu SC, Lin JQ, Liu P, Xia YB, Luo B. Protecting mobile devices from physical memory attacks with targeted
encryption. In: Proc. of the 12th Conf. on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, 2019. 34–44.
[doi: 10.1145/3317549.3319721]
[99] Enck W, Gilbert P, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN. TaintDroid: An information-flow tracking system for
realtime privacy monitoring on smartphones. In: Proc. of the 9th USENIX Symp. on Operating Systems Design and
Implementation (OSDI). USENIX Association, 2010. 393–407. [doi: 10.5555/1924943.1924971]
[100] ARM Ltd. The ARM system memory management units. 2019. https://developer.arm.com/ip-products/system-ip/system-
controllers/system-memory-management-unit
[101] Chu DW, Wang YW, Lei LG, Li YC, Jing JW, Sun K. OCRAM-assisted sensitive data protection on ARM-based platform. In:
Proc. of the 24th European Symp. on Research in Computer Security (ESORICS). Cham: Springer-Verlag, 2019. 412–438. [doi:
10.1007/978-3-030-29962-0_20]
[102] Hong D, Bathen LAD, Lim SS, Dutt N. DynaPoMP: Dynamic policy-driven memory protection for SPM-based embedded
systems. In: Proc. of the 6th Workshop on Embedded Systems Security (WESS). ACM, 2011,5:1–10. [doi: 10.1145/2072274.
2072279]
[103] Zhang N, Sun K, Lou WJ, Hou YT. Case: Cache-assisted secure execution on ARM processors. In: Proc. of the 37th IEEE Symp.
on Security and Privacy (SP). IEEE, 2016. 72–90. [doi: 10.1109/SP.2016.13]
[104] Chen X, Dick RP, Choudhary A. Operating system controlled processor-memory bus encryption. In: Proc. of the 11th Design,
Automation and Test in Europe (DATE). IEEE, 2008. 1154–1159. [doi: 10.1109/DATE.2008.4484834]
[105] Chen Y, Khandaker M, Wang Z. Secure in-cache execution. In: Proc. of the 20th Int’l Symp. on Research in Attacks, Intrusions,
and Defenses (RAID). Cham: Springer-Verlag, 2017. 381–402. [doi: 10.1007/978-3-319-66332-6_17]
[106] Yun MH, Zhong L. Ginseng: Keeping secrets in registers when you distrust the operating system. In: Proc. of the 26th Annual
Network and Distributed System Security Symp. (NDSS). Internet Society, 2019. [doi: 10.14722/ndss.2019.23327]
[107] Papadopoulos P, Vasiliadis G, Christou G, Markatos E, Ioannidis S. No sugar but all the taste! Memory encryption without
architectural support. In: Proc. of the 22nd European Symp. on Research in Computer Security (ESORICS). Cham: Springer-
Verlag, 2017. 362–380. [doi: 10.1007/978-3-319-66399-9_20]
[108] Seitzer M, Gruhn M, Müller T. A bytecode interpreter for secure program execution in untrusted main memory. In: Proc. of the
20th European Symp. on Research in Computer Security (ESORICS). Cham: Springer-Verlag, 2015. 376–395. [doi: 10.1007/978-
3-319-24177-7_19]