Browsing LCS Technical Reports (1974 - 2003) by Author "van Dijk, Marten"
Now showing items 1-7 of 7
-
The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas (2003)We describe the architecture for a single-chip AEGIS processor which can be used to build computing systems secure against both physical and software attacks. Our architecture assumes that all components external to the ... -
Caches and Merkle Trees for Efficient Memory Authentication
Gassend, Blaise; Suh, G. Edward; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas (2002-07) -
Controlled Physical Unknown Functions: Applications to Secure Smartcards and Certified Execution
Gassend, Blaise; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas (2002-06) -
Delay-Based Circuit Authentication With Application to Key Cards
Gassend, Blaise; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas (2002-06) -
Hardware Mechanisms for Memory Integrity Checking
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas (2002-11)Memory integrity verification is a useful primitive when implementing secure processors that are resistant to attacks on hardware components. This paper proposes new hardware schemes to verify the integrity of untrusted ... -
Incremental Multiset Hash Functions and their Application to Memory Integrity Checking
Clarke, Dwaine; Devadas, Srinivas; van Dijk, Marten; Gassend, Blaise; Suh, G. Edward (2003-05)We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). They map multisets of arbitrary finite ... -
Offline Integrity Checking of Untrusted Storage
Clarke, Dwaine; Gassend, Blaise; Suh, G. Edward; van Dijk, Marten; Devadas, Srinivas (2002-11)