Back to Results
First PageMeta Content



Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2
Add to Reading List

Document Date: 2008-07-20 00:16:18


Open Document

File Size: 183,04 KB

Share Result on Facebook

City

Mountain View / New York / /

Company

XOM Original Hardware / TCPA / Compartment Key Table Comp / the AES / Microsoft / /

Country

United States / /

Currency

USD / /

Event

Reorganization / Product Issues / /

Facility

OpenSSL library / University of Toronto Toronto / We store / /

IndustryTerm

on software / typical operating systems / capability-based operating systems / hash tree hardware / on-line gaming / system software / secure co-processor / software-based solutions / cryptographic algorithms / in-order processor / secure applications / portable device containing sensitive software / processor hardware / software producer / higher level software / ordinary processors / tamper-resistant software / software distribution model / software piracy / typical modern processor / off-chip / software obfuscation / suspicious applications / co-processor / memory management / /

OperatingSystem

UNIX / IRIX / Fork / /

Organization

University of Toronto Toronto / Stanford University Stanford / Mark Horowitz Computer Systems Lab. / /

Person

David Lie / /

/

Position

rt / General / resource manager / xrclm $rt xexit $rt secure store xsd $rt / entry $rt / Untrusted Operating Systems General / software producer / tag $rt / software-based resource manager / register xrstr $rt / $rt / programmer / exit xom xinval $rt xrclm $rt xexit $rt / NULL xmvtn $rt / relatively straight forward / Stores $rt / register xgetid $rt / $rd xenc $rt / $rd xsave $rt / secure load xld $rt / Use $rt / xalloc $rt / Loads $rt / manager / the only major attack / /

Product

Register Key Table / arguments / /

ProgrammingLanguage

C / /

ProvinceOrState

New York / California / /

PublishedMedium

the Nexus / /

Technology

block cipher / Operating System / shared memory / encryption / cryptography / secure co-processor / virtual memory / UNIX / simulation system / private key / same processor / MP3 / operating systems / 6.2 Basic Processor / in-order processor / public key / CPU chip / Paging / /