{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:14:34Z","timestamp":1725912874295},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663319"},{"type":"electronic","value":"9783319663326"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_17","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:05Z","timestamp":1507708685000},"page":"381-402","source":"Crossref","is-referenced-by-count":5,"title":["Secure In-Cache Execution"],"prefix":"10.1007","author":[{"given":"Yue","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mustakimur","family":"Khandaker","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"17_CR1","unstructured":"FreeBSD. https:\/\/www.freebsd.org"},{"key":"17_CR2","unstructured":"SSL Library mbed TLS\/PolarSSL. https:\/\/tls.mbed.org"},{"key":"17_CR3","unstructured":"Trustworthy Cloud Computing with vCage. https:\/\/privatecore.com\/vcage\/"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Backes, M., Holz, T., Kollenda, B., Koppe, P., N\u00fcrnberger, S., Pewny, J.: You can run but you can\u2019t read: preventing disclosure exploits in executable code. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014) (2014)","DOI":"10.1145\/2660267.2660378"},{"issue":"3","key":"17_CR5","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. 33(3), 8 (2015)","journal-title":"ACM Trans. Comput. Syst."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII) (2008)","DOI":"10.1145\/1346281.1346284"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of the 13th Conference on USENIX Security Symposium (SSYM 2004), vol. 13 (2004)","DOI":"10.1145\/1133572.1133599"},{"key":"17_CR8","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. https:\/\/eprint.iacr.org\/2016\/086.pdf"},{"key":"17_CR9","unstructured":"Nallusamy, E.: A framework for using processor cache as RAM (CAR). http:\/\/www.coreboot.org\/images\/6\/6c\/LBCar.pdf"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried, J., M\u00fcller, T.: ARMORED: CPU-bound encryption for android-driven ARM devices. In: Proceedings of 8th International Conference on Availability, Reliability and Security, Regensburg (2013)","DOI":"10.1109\/ARES.2013.23"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried, J., M\u00fcller, T., Drescher, G., N\u00fcrnberger, S., Backes, M.: RamCrypt: kernel-based address space encryption for user-mode processes. In: Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2016). ACM (2016)","DOI":"10.1145\/2897845.2897924"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Guan, L., Lin, J., Jing, B.L.: Copker: computing with private keys without RAM. In: Proceedings of the 21th Network and Distributed System Security Symposium (NDSS 2014) (2014)","DOI":"10.14722\/ndss.2014.23125"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Guan, L., Lin, J., Luo, B., Jing, J., Wang, J.: Protecting private keys against memory disclosure attacks using hardware transactional memory. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP 2015), pp. 3\u201319. IEEE Computer Society, Washington, DC (2015)","DOI":"10.1109\/SP.2015.8"},{"key":"17_CR14","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W., Remember, L.W.: Cold-boot attacks on encryption keys. In: Proceedings of the 17th USENIX Conference on Security, San Jose (2008)"},{"key":"17_CR15","volume-title":"Computer Architecture: A Quantitative Approach","author":"JL Hennessy","year":"2012","unstructured":"Hennessy, J.L., Patterson, D.A.: Computer Architecture: A Quantitative Approach. Morgan Kaufmann, San Francisco (2012)"},{"key":"17_CR16","unstructured":"Intel: Intel 64 and IA-32 Architectures Software Developer\u015b Manual, February 2014"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Eisenbarth, T., Sunar, B.: S $ A: a shared cache attack that works across cores and defies VM sandboxing-and its application to AES. In: Proceedings of the 36th IEEE Symposium on Security and Privacy, pp. 591\u2013604. IEEE (2015)","DOI":"10.1109\/SP.2015.42"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: Proceedings of the 36th IEEE Symposium on Security and Privacy, pp. 605\u2013622 (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-319-26362-5_3","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"C Maurice","year":"2015","unstructured":"Maurice, C., Scouarnec, N., Neumann, C., Heen, O., Francillon, A.: Reverse engineering intel last-level cache complex addressing using performance counters. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 48\u201365. Springer, Cham (2015). doi: 10.1007\/978-3-319-26362-5_3"},{"key":"17_CR20","volume-title":"The Design and Implementation of the FreeBSD Operating System","author":"MK McKusick","year":"2014","unstructured":"McKusick, M.K., Neville-Neil, G.V., Watson, R.N.: The Design and Implementation of the FreeBSD Operating System. Addison-Wesley Professional, London (2014)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"M\u00fcller, T., Dewald, A., Freiling, F.C.: AESSE: a cold-boot resistant implementation of AES. In: Proceedings of the Third European Workshop on System Security, Paris (2010)","DOI":"10.1145\/1752046.1752053"},{"key":"17_CR22","unstructured":"M\u00fcller, T., Freiling, F.C., Dewald, A.: TRESO: runs encryption securely outside RAM. In: Proceedings of the 20th USENIX Conference on Security, San Francisco (2011)"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"M\u00fcller, T., Spreitzenbarth, M.: FROST: forensic recovery of scrambled telephones. In: Proceedings of the 11th International Conference on Applied Cryptography and Network Security, Banff (2013)","DOI":"10.1007\/978-3-642-38980-1_23"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Onarlioglu, K., Mulliner, C., Robertson, W., Kirda, E.: PrivExec: private execution as an operating system service. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP 2013). IEEE Computer Society, Washington, DC (2013)","DOI":"10.1109\/SP.2013.24"},{"key":"17_CR25","volume-title":"Operating System Concepts","author":"A Silberschatz","year":"2012","unstructured":"Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts. Wiley, Harlow (2012)"},{"key":"17_CR26","unstructured":"Simmons, P., Amnesia, S.T.: A software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th Annual Computer Security Applications Conference, Orlando (2011)"},{"key":"17_CR27","unstructured":"Lest We Remember: Cold-boot attacks on encryption keys. https:\/\/citp.princeton.edu\/research\/memory\/"},{"key":"17_CR28","unstructured":"FROST: Forensic Recovery Of Scrambled Telephones. http:\/\/www1.informatik.uni-erlangen.de\/frost"},{"key":"17_CR29","unstructured":"Yarom, Y., Ge, Q., Liu, F., Lee, R.B., Heiser, G.: Mapping the Intel last-level cache. https:\/\/eprint.iacr.org\/2015\/905.pdf"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, N., Sun, K., Lou, W., Hou, Y.T.: CaSE: cache-assisted secure execution on ARM processors. In: Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP 2016) (2016)","DOI":"10.1109\/SP.2016.13"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, N., Sun, K., Lou, W., Hou, Y.T., Jajodia, S.: Now you see me: hide and seek in physical address space. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA (CCS 2015). ACM (2015)","DOI":"10.1145\/2714576.2714600"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T19:40:09Z","timestamp":1693078809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}