보안을 위한 프로세서 기술 동향

  • 김지훈 (서울과학기술대학교 전기정보공학과) ;
  • 김동규 (한양대학교 융합전자공학부)
  • Published : 2016.07.25

Abstract

Keywords

References

  1. "SearchNetworking 2015 Purchasing Intentions Survey," TechTarget, May 2015.
  2. 김호원, 김동규, "IoT 기술과 보안," 정보보호학회지, 22(1), 2012년 2월, 7-13.
  3. Rob Coombs, "Designing Security & Trust into Connected Devices," ARM Techcon 2015.
  4. Fengwei Zhang and Hongwei Zhang, "SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security," HASP 2016.
  5. Ruby B. Lee, "Security Basics," HotChips 2014.
  6. David Lie, et al., "Architectural Support for Copy and Tamper Resistant Software," ASPLOS 2000.
  7. G. Edward Suh, et al., "Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions," ISCA 2005.
  8. Victor Costan, et al., "Sanctum: Minimal Hardware Extensions for Strong Software Isolation," Usenix Security Symposium, 2015.
  9. www.arm.com
  10. Igor Skochinsky, "Intel ME Secrets," RECON 2014.
  11. AMD TATS BIOS Development Group, "AMD Security and Server Innovation," UEFI Spring PlugFest, 2013.
  12. Victor Costan and Srinivas Devadas, "Intel SGX Explained," http://eprint.iacr.org/2016/086.pdf, 2016.
  13. Frank McKeen, et al., "Intel Software Guard Extensions (Intel SGX) SGX2," HASP 2016.