DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» TRESOR
TRESOR
A Complete Bibliography of ACM Transactions on Computer Systems
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
Using Registers As Buffers to Resist Memory Disclosure Attacks Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma
Lest We Remember: Cold Boot Attacks on Encryption Keys
Encrypted Execution and You
OS-Level Attacks and Defenses: from Software to Hardware-Based Exploits © December 2018 by David Gens Phd Referees: Prof
Protecting Data In-Use from Firmware and Physical Attacks
Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory
Analysing Android's Full Disk Encryption Feature
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform
Protecting Data In-Use from Firmware and Physical Attacks
Trevisor OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks
Trusted Systems in Untrusted Environments: Protecting Against Strong Attackers
Disk Encryption Rob Hornbuckle East Carolina
Simplex: Repurposing Intel® Memory Protection Extensions for Information Hiding Salvaging Endangered Hardware Features for Security
Toward Usable, Robust Memometric Authentication: an Evaluation of Selected Password Generation Assistance Peter Thomas Henry
Recovering the Master Key from RAM to Break Android's File
Cold Boot Attacks Are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
Top View
CPU As the New Perimeter Aiattestation and Memory Eeincryption Protect Ssiiensitive Data in the Cloud
Hidden in Snow, Revealed in Thaw Cold Boot Attacks Revisited
CARMA: a Hardware Tamper-Resistant Isolated Execution Environment on Commodity X86 Platforms
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System
Background & Design
Nvcool: When Non-Volatile Caches Meet Cold Boot Attacks*
HARES: Hardened Anti-Reverse Engineering System
Leveraging Intel DCI for Memory Forensics Tobias Latzo, Matti Schulze and Felix Freiling∗
CARMA: a Hardware Tamper-Resistant Isolated Execution Environment on Commodity X86 Platforms
Data Usage Control for Distributed Systems
Secure In-Cache Execution
Intel X86 Hardware Security Primitives “What Tools Are in the Tool-Chest?”
A Flexible Framework for Mobile Device Forensics Based on Cold Boot Attacks Manuel Huber1* , Benjamin Taubmann2, Sascha Wessel1,Hansp.Reiser2 and Georg Sigl3
No Sugar but All the Taste! Memory Encryption Without Architectural Support
Securely Handling Inter-Application Connection Credentials Gary Lieberman Nova Southeastern University,
[email protected]
TRESOR Runs Encryption Securely Outside RAM
Designing Future Low-Power and Secure Processors with Non-Volatile Memory
Isolating Operating System Components with Intel SGX