{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:52:00Z","timestamp":1725900720508},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145964"},{"type":"electronic","value":"9783642145971"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14597-1_3","type":"book-chapter","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T13:50:13Z","timestamp":1278683413000},"page":"39-59","source":"Crossref","is-referenced-by-count":12,"title":["A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks"],"prefix":"10.1007","author":[{"given":"T. Paul","family":"Parker","sequence":"first","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-642-00457-5_28","volume-title":"Theory of Cryptography","author":"A. Akavia","year":"2009","unstructured":"Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 474\u2013495. Springer, Heidelberg (2009)"},{"key":"3_CR2","unstructured":"Anderson, R.: On the forward security of digital signatures. Technical report, University of Cambridge (1997)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 431\u2013448. Springer, Heidelberg (1999)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36563-X_1","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Yee, B.: Forward-security in private-key cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 1\u201318. Springer, Heidelberg (2003)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A fast new des implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-49649-1_3","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Durfee, G., Frankel, Y.: An attack on RSA given a small fraction of the private key bits. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 25\u201334. Springer, Heidelberg (1998)"},{"key":"3_CR8","unstructured":"Broadwell, P., Harren, M., Sastry, N.: Scrash: A system for generating secure crash information. In: Proceedings of Usenix Security Symposium 2003, pp. 273\u2013284 (2004)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-45539-6_33","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"R. Canetti","year":"2000","unstructured":"Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 453\u2013469. Springer, Heidelberg (2000)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of Usenix Security Symposium 2004, pp. 321\u2013336 (2004)","DOI":"10.1145\/1133572.1133599"},{"key":"3_CR11","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Rosenblum, M.: Shredding your garbage: Reducing data lifetime. In: Proc. 14th USENIX Security Symposium (August 2005)"},{"key":"3_CR12","unstructured":"Intel Corporation. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 1: Basic Architecture. Intel Corporation (2007)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-46035-7_5","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"Y. Dodis","year":"2002","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 65\u201382. Springer, Heidelberg (2002)"},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM\u00a043(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"3_CR16","unstructured":"Trusted\u00a0Computing Group, https:\/\/www.trustedcomputinggroup.org\/"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: Proc. 17th USENIX Security Symposium, San Jose, CA (August 2008)","DOI":"10.1145\/1506409.1506429"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Harrison, K., Xu, S.: Protecting cryptographic keys from memory disclosure attacks. In: IEEE DSN 2007, pp. 137\u2013143 (2007)","DOI":"10.1109\/DSN.2007.77"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Hoover, D., Kausik, B.: Software smart cards via cryptographic camouflage. In: IEEE Symposium on Security and Privacy, pp. 208\u2013215 (1999)","DOI":"10.1109\/SECPRI.1999.766915"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45708-9_32","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"G. Itkis","year":"2002","unstructured":"Itkis, G., Reyzin, L.: Sibir: Signer-base intrusion-resilient signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 499\u2013514. Springer, Heidelberg (2002)"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/112600.112605","volume-title":"PODC 1991: Proceedings of the tenth annual ACM symposium on Principles of distributed computing","author":"R. Ostrovsky","year":"1991","unstructured":"Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks (extended abstract). In: PODC 1991: Proceedings of the tenth annual ACM symposium on Principles of distributed computing, pp. 51\u201359. ACM Press, New York (1991)"},{"key":"3_CR23","unstructured":"Parker, T.P.: Safekeeping your keys: Keep them out of ram. In: DSN 2007 Student Forum, June 25-28 (2007)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Piegdon, D., Pimenidis, L.: Hacking in physically adressable memory. In: Proc. 4th International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, DIMVA 2007 (2007)","DOI":"10.1007\/978-3-540-73614-1_12"},{"key":"3_CR25","unstructured":"Provos, N.: Encrypting virtual memory. In: Proceedings of Usenix Security Symposium 2000 (2000)"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-48390-X_9","volume-title":"Financial Cryptography","author":"A. Shamir","year":"1999","unstructured":"Shamir, A., van Someren, N.: Playing \u2018hide and seek\u2019 with stored keys. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, p. 118. Springer, Heidelberg (1999)"},{"key":"3_CR27","unstructured":"Viega, J.: Protecting sensitive data in memory (2001), http:\/\/www.cgisecurity.com\/lib\/protecting-sensitive-data.html"},{"key":"3_CR28","volume-title":"Building Secure Software","author":"J. Viega","year":"2002","unstructured":"Viega, J., McGraw, G.: Building Secure Software. Addison-Wesley, Reading (2002)"},{"key":"3_CR29","unstructured":"Yee, B.: Using secure coprocessors. PhD thesis, Carnegie Mellon University, CMU-CS-94-149 (May 1994)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14597-1_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:51:32Z","timestamp":1685667092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14597-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145964","9783642145971"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14597-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}