과제정보
이 논문은 과학기술정보통신부의 재원으로 정보통신기획평가원(No. 2020-0-01840, 스마트폰의 내부데이터 접근 및 보호 기술 분석)과 한국연구재단(No. NRF-2022R1A4A1032361, Processing-in-Memory 보안 기술개발)의 지원을 받아 수행된 연구임
참고문헌
- Intel Software Guard Extensions ProgrammingReference, Oct. 2014. Reference no. 329298-002US.
- Intel Software Guard Extensions Developer Guide,2016.
- Intel Software Guard Extensions Evaluation SDK forWindows OS. User's Guide, Jan. 2016. Revision 1.1.1.
- UPMEM SAS. 2021. UPMEM SDK.
- UPMEM Driver(Kernel Module) 2023.
- AFARI Research Group, 2020. Understanding a ModernProcessing-in-Memory Architecture
- S. Weiser and M. Werner, "SGXIO: Generic trusted I/O path for IntelSGX," in Proc. 7th ACM Conf. Data Appl. Secur. Privacy, Mar. 2017,pp. 261-268
- Wu, Xiaolong, Dave Jing Tian, and Chung Hwan Kim. "Building GPU TEEs using CPU Secure Enclaves with GEVisor." Proceedings of the 2023 ACM Symposium on Cloud Computing . 2023.
- Ahmad, Adil, et al. "An Extensible Orchestration and Protection Framework for Confidential Cloud Computing." 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23) . 2023.
- Wang, Ziyang, et al. "SEGIVE: A practical framework of secure GPU execution in virtualization environment." 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC). IEEE, 2020.