Search For:

Displaying 1-4 out of 4 total
Aegis: A Single-Chip Secure Processor
Found in: IEEE Design and Test of Computers
By G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas
Issue Date:November 2007
pp. 570-580
This article presents the Aegis secure processor architecture, which enables physically secure computing platforms with a main processor as the only trusted component. The Aegis architecture ensures private and authentic program execution even in the face ...
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Found in: Computer Architecture, International Symposium on
By G. Edward Suh, Charles W. O'Donnell, Ishan Sachdev, Srinivas Devadas
Issue Date:June 2005
pp. 25-36
Secure processors enable new applications by ensuring private and authentic program execution even in the face of physical attack. In this paper we present the AEGIS secure processor architecture, and evaluate its RTL implementation on FPGAs. By using Phys...
Information Leak in the Chord Lookup Protocol
Found in: Peer-to-Peer Computing, IEEE International Conference on
By Charles W. O'Donnell, Vinod Vaikuntanathan
Issue Date:August 2004
pp. 28-35
In Peer-to-peer (P2P) systems, it is often essential that connected systems (nodes) relay messages which did not originate locally, on to the greater network. As a result, an intermediate node might be able to determine a large amount of information about ...
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
Found in: Proceedings of the first ACM workshop on Scalable trusted computing (STC '06)
By Charles W. O'Donnell, Jonathan Rhodes, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas
Issue Date:November 2006
pp. 27-42
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and di...