{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:42:30Z","timestamp":1758634950318},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540303176"},{"type":"electronic","value":"9783540322726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11587514_11","type":"book-chapter","created":{"date-parts":[[2005,10,26]],"date-time":"2005-10-26T13:51:49Z","timestamp":1130334709000},"page":"153-168","source":"Crossref","is-referenced-by-count":9,"title":["Memory-Centric Security Architecture"],"prefix":"10.1007","author":[{"given":"Weidong","family":"Shi","sequence":"first","affiliation":[]},{"given":"Chenghuai","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Hsien-Hsin S.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Cohen, E., Jefferson, D.: Protection in the hydra operating system. In: Proceedings of the 5th Symposium on Operating Systems Principles (1975)","DOI":"10.1145\/800213.806532"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectual Support For Copy and Tamper Resistant Software. In: Proceedings of the 9th Symposium on Architectural Support for Programming Languages and Operating Systems (2000)","DOI":"10.21236\/ADA419599"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. In: Proceedings of the Symposium on Operating Systems Principles (2003)","DOI":"10.1145\/945445.945463"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Needham, R.M., Walker, R.D.: The Cambridge CAP Computer and its Protection System. In: Proceedings of the Symposium on Operating Systems Principles (1977)","DOI":"10.1145\/800214.806541"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Shi, W., Lee, H.-H.S., Ghosh, M., Lu, C., Boldyreva, A.: High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. In: Proceedings of the International Symposium on Computer Architecture (2005)","DOI":"10.1145\/1080695.1069972"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Suh, E.G., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Efficient Memory Integrity Verification and Encryption for Secure Processors. In: Proceedings 0f the 36th Annual International Symposium on Microarchitecture (2003)","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Suh, E.G., Clarke, D., van Dijk, M., Gassend, B., Devadas, S.: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In: Proceedings of the International Conference on Supercomputing (2003)","DOI":"10.1145\/782814.782838"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., August, D.I.: RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In: Proceedings of the International Symposium on Microarchitecture (2004)","DOI":"10.1109\/MICRO.2004.31"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Vlaovic, S., Davidson, E.S.: TAXI: Trace Analysis for X86 Interpretation. In: Proceedings of the 2002 IEEE International Conference on Computer Design (2002)","DOI":"10.1109\/ICCD.2002.1106821"},{"key":"11_CR10","unstructured":"Witchel, E.J.: Mondrian Memory Protection. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (2004)"},{"key":"11_CR11","unstructured":"Yang, J., Zhang, Y., Gao, L.: Fast Secure Processor for Inhibiting Software Piracty and Tampering. In: Proceedings of International Symposium on Microarchitecture (2003)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Zhuang, X., Zhang, T., Pande, S.: HIDE: an Infrastructure for Efficiently Protecting Information Leakage on the Address Bus. In: Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (2004)","DOI":"10.1145\/1024393.1024403"},{"key":"11_CR13","unstructured":"Zhuang, X., Zhang, T., Pande, S., Lee, H.-H.S.: HIDE: Hardware-support for Leakage-Immune Dynamic Execution. Technical Report GIT-CERCS-03-21, Geogia Institute of Technology (2003)"}],"container-title":["Lecture Notes in Computer Science","High Performance Embedded Architectures and Compilers"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11587514_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:01:29Z","timestamp":1605643289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11587514_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540303176","9783540322726"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11587514_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}