{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T06:45:22Z","timestamp":1745477122437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663982"},{"type":"electronic","value":"9783319663999"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66399-9_20","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T14:03:24Z","timestamp":1502460204000},"page":"362-380","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["No Sugar but All the Taste! Memory Encryption Without Architectural Support"],"prefix":"10.1007","author":[{"given":"Panagiotis","family":"Papadopoulos","sequence":"first","affiliation":[]},{"given":"Giorgos","family":"Vasiliadis","sequence":"additional","affiliation":[]},{"given":"Giorgos","family":"Christou","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Markatos","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"20_CR1","unstructured":"Abramson, D., Jackson, J., Muthrasanallur, S., Neiger, G., Regnier, G., Sankaran, R., Schoinas, I., Uhlig, R., Vembu, B., Wiegert, J.: Intel virtualization technology for directed i\/o. Intel Technol. J. 10(3)"},{"key":"20_CR2","unstructured":"Advanced Micro Devices Inc. AMD I\/O Virtualization Technology (IOMMU). http:\/\/support.amd.com\/TechDocs\/48882_IOMMU.pdf"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. TCS 33(3) (2015)","DOI":"10.1145\/2799647"},{"key":"20_CR4","unstructured":"Berkowits, S.: Pin - a dynamic binary instrumentation tool (2012). https:\/\/software.intel.com\/en-us\/articles\/pin-a-dynamic-binary-instrumentation-tool"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Blass, E.-O., Robertson, W.: TRESOR-HUNT: attacking CPU-bound encryption. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012 (2012)","DOI":"10.1145\/2420950.2420961"},{"key":"20_CR6","unstructured":"Boileau, A.: Hit by a bus: Physical access attacks with firewire. Presentation, Ruxcon"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Champagne, D., Lee, R.B.: Scalable architectural support for trusted software. In: HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture, HPCA 2010 (2010)","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Chan, E.M., Carlyle, J.C., David, F.M., Farivar, R., Campbell, R.H.: Bootjacker: compromising computers using forced restarts. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008 (2008)","DOI":"10.1145\/1455770.1455840"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Colp, P., Zhang, J., Gleeson, J., Suneja, S., de Lara, E., Raj, H., Saroiu, S., Wolman, A.: Protecting data on smartphones and tablets from memory attacks. In: Proceedings of the Twentieth International Conference on ASPLOS 2015 (2015)","DOI":"10.1145\/2694344.2694380"},{"key":"20_CR10","unstructured":"Dilley, J.A.: Web server workload characterization. Hewlett-Packard Laboratories, Technical Publications Department"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Gruhn, M., M\u00fcller, T.: On the practicability of cold boot attacks. In: Proceedings of the 2013 International Conference on ARES 2013 (2013)","DOI":"10.1109\/ARES.2013.52"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5) (2009)","DOI":"10.1145\/1506409.1506429"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Henson, M., Taylor, S.: Memory encryption: a survey of existing techniques. ACM Comput. Surv. 46(4)","DOI":"10.1145\/2566673"},{"key":"20_CR14","unstructured":"Intel Corporation. Software guard extensions programming reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Koromilas, L., Vasiliadis, G., Manousakis, I., Ioannidis, S.: Efficient software packet processing on heterogeneous and asymmetric hardware architectures. In: Proceedings of the Tenth ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS 2014 (2014)","DOI":"10.1145\/2658260.2658265"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Markuze, A., Morrison, A., Tsafrir, D.: True IOMMU protection from DMA attacks: when copy is faster than zero copy. In: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2016 (2016)","DOI":"10.1145\/2872362.2872379"},{"key":"20_CR17","unstructured":"McGregor, P., Hollebeek, T., Volynkin, A., White, M.: Braving the cold: new methods for preventing cold boot attacks on encryption keys. In: Black Hat Security Conference (2008)"},{"key":"20_CR18","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"M\u00fcller, T., Dewald, A., Freiling, F.C.: AESSE: a cold-boot resistant implementation of AES. In: Proceedings of the Third European Workshop on System Security, EUROSEC 2010 (2010)","DOI":"10.1145\/1752046.1752053"},{"key":"20_CR20","unstructured":"M\u00fcller, T., Freiling, F.C., Dewald, A.: Tresor runs encryption securely outside ram. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011. USENIX Association (2011)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-540-69338-3_2","volume-title":"High Performance Embedded Architectures and Compilers","author":"V Nagarajan","year":"2007","unstructured":"Nagarajan, V., Gupta, R., Krishnaswamy, A.: Compiler-assisted memory encryption for embedded processors. In: Bosschere, K., Kaeli, D., Stenstr\u00f6m, P., Whalley, D., Ungerer, T. (eds.) HiPEAC 2007. LNCS, vol. 4367, pp. 7\u201322. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-69338-3_2"},{"key":"20_CR22","unstructured":"Ou, G.: Cryogenically frozen ram bypasses all disk encryption methods. http:\/\/www.zdnet.com\/article\/cryogenically-frozen-ram-bypasses-all-disk-encryption-methods\/"},{"key":"20_CR23","unstructured":"Phidgets, Inc. 1122_0 $$-$$ 30 Amp Current Sensor AC\/DC. http:\/\/www.phidgets.com\/products.php?category=8&product_id=1122_0"},{"key":"20_CR24","unstructured":"Piegdon, D.R.: Hacking in physically addressable memory: a proof of concept. http:\/\/eh2008.koeln.ccc.de\/fahrplan\/attachments\/1067_SEAT1394-svn-r432-paper.pdf"},{"key":"20_CR25","unstructured":"PrivateCore. Trustworthy computing for OpenStack with vCage. http:\/\/privatecore.com\/vcage\/"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Simmons, P.: Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011 (2011)","DOI":"10.1145\/2076732.2076743"},{"key":"20_CR27","unstructured":"Skorobogatov, S.: Low temperature data remanence in static ram (2002)"},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-37300-8_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"P Stewin","year":"2013","unstructured":"Stewin, P., Bystrov, I.: Understanding DMA malware. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 21\u201341. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-37300-8_2"},{"key":"20_CR29","unstructured":"Wetzels, J.: Hidden in snow, revealed in thaw: cold boot attacks revisited. CoRR, abs\/1408.0725"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, N., Sun, K., Lou, W., Hou, Y.T.: Case: cache-assisted secure execution on arm processors. In: 2016 IEEE Symposium on Security and Privacy (SP), S&P 2016 (2016)","DOI":"10.1109\/SP.2016.13"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66399-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T00:11:52Z","timestamp":1660522312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66399-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663982","9783319663999"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66399-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/deic.uab.cat\/conferences\/dpm\/dpm2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}