Back to Results
First PageMeta Content
CPU cache / Computer data storage / Dynamic random-access memory / Direct memory access / Memory hierarchy / Solid-state drive / Cache / Random-access memory / Microarchitecture / Computer hardware / Computer memory / Computing


Defending Against Attacks on Main Memory Persistence∗ William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith Systems and Internet Infrastructure Security (SIIS) Laboratory, Department of Comput
Add to Reading List

Open Document

File Size: 2,03 MB

Share Result on Facebook

City

Austin / Lincoln / S. Bennett / /

Company

Fujitsu / Advanced Micro Devices Inc. / Emerging Non-Volatile Memory Technologies / Standard Performance Evaluation Corp. / Dell / Rambus / AES a. s . / Adam Smith Systems / Tamper Resistant Software / Intel / Freescale Semiconductor / Toshiba / Internet Infrastructure Security / NEC / /

/

Facility

The Pennsylvania State University / /

IndustryTerm

non-volatile systems / involved and time-intensive solution / removable device / sketch possible solutions / power management services / resident applications / energy efficiency / prediction algorithms / non-volatile memory systems / memory chips / grid processing / manufacturing challenge / secure processor / online attacks / subject systems / considerable processing oscillation / greater instanteneous processor / real time values / legacy software / frozen volatile memory chips / multiprocessor systems / volatile main memory systems / secure processors / online attack / coherency protocols / fabrication technology / virtualization technology / generation processors / optimizations specific to systems / magnetic media / non-volatile memory technologies / suitable encryption algorithm / /

MarketIndex

IPC 80 / IPC 100 / /

Organization

Department of Computer Science and Engineering / Memory Encryption Control Unit / National Science Foundation / The Pennsylvania State University / /

Person

Patrick McDaniel / Thomas Richardson / Kevin Butler / /

Position

system administrator / broker / butler / author / representative / /

Product

SimpleScalar / SimpleScalar/PISA / Memory Block Pad / /

ProvinceOrState

Manitoba / /

Technology

RAM / coherency protocols / non-volatile memory technologies / 1 GHz processor / smart card / GCM encryption / SRAM / operating system / TCP/IP protocol / shared memory / memory block encryption / already selling chips / Encryption / cryptography / zero-cost steady state encryption / 64-bit Processors / secure processor / counter mode encryption / virtual memory / fabrication technology / less re-encryption / memory re-encryption / MRAM device / disk drive / 2 Mbit FRAM Chips / greater instanteneous processor / Operating systems / memory chips / Memory block re-encryption / prediction algorithms / Bus Encryption / pdf / I/O virtualization technology / memory encryption / laser / segment re-encryption / generation processors / sa State Lookup Wdata L1/L2 Cache Addr Processor / lazy re-encryption / caching / simulation / DRAM chips / suitable encryption algorithm / frozen volatile memory chips / /

URL

http /

SocialTag