Back to Results
First PageMeta Content
CPU cache / Dynamic random-access memory / Synchronous dynamic random-access memory / Side channel attack / Microarchitecture / DIMM / CAS latency / Static random-access memory / SDRAM latency / Computer memory / Computer hardware / Computing


Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs Christopher W. Fletcher†∗, Ling Ren† , Xiangyao Yu† , Marten Van Dijk‡ , Omer Khan‡ , Srinivas D
Add to Reading List

Document Date: 2014-01-23 18:47:27


Open Document

File Size: 1,19 MB

Share Result on Facebook

Company

MB LLC / Program Efficiency Trade / Aegis / Intel / the AES / /

Country

United States / /

Currency

pence / AMD / /

/

Facility

University of Connecticut / Massachusetts Institute of Technology / /

IndustryTerm

secure processor / energy coefficients / given processor / physical/hardware / user-server protocol / inside tamper-resistant hardware / cycle energy / malicious software / tamper-resistant/secure processors / energy / secure cloud computing / secure processors / conventional public-key infrastructure / energy consumption / model secure processors / energy coefficient / on/off chip / manufacturing time / read/write energy / candidate solution / recent secure processor / insecure systems / cloud computing / energy model / energy-per-cycle / be accomplished using a conventional public-key infrastructure / /

MarketIndex

SPEC / /

NaturalFeature

ORAM channel / /

Organization

University of Connecticut / Massachusetts Institute of Technology / Department of Defense / SESC / /

Person

Christopher W. Fletcher / Van Dijk / Ling Ren / Omer Khan / Srinivas Devadas / /

Position

model external DRAM power consumption / architect / controller and on-chip DRAM controller / conventional DRAM controller / official US policy / ORAM controller / functionally-equivalent ORAM controller / ORAM Accesses The ORAM controller / representative / DRAM controller / Controller / /

Product

Tmax / /

ProgrammingLanguage

FP / L / /

ProvinceOrState

Manitoba / /

RadioStation

Core / Watt / /

Technology

tamper-resistant/secure processors / RAM / ORAM-enabled secure processor / given processor / example protocol / recent secure processor / user-server protocol / perl / secret key / SRAM / main memory using probabilistic encryption / symmetric / probabilistic encryption / on/off chip / Cache L2 hit+miss latencies Cache/ORAM block size Memory system DRAM frequency/channels Off-chip / public-key infrastructure / encryption / ORAM protocols / public key / model secure processors / secure processor / 4.2 Monitoring The Secure Processor / 4.1 Secure Processor / SDRAM / Leakage Aware Processors / 5 User-Server Protocols / buffer On-Chip / /

SocialTag