共 15 条
[11]
SCONE:Secure Linux containers with Intel SGX .2 Arnautov S,Trach B,Gregor F,et al. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . 2016
[12]
Software grand exposure:SGX cache attacks are practical .2 Brasser F,Müller U,Dmitrienko A,Kostianinen K,Capkun S,Sadeghi AR. Proc.of the 11th USENIX Workshop on Offensive Technologies (WOOT 2017) . 2017
[13]
Trustotp:Transforming smartphones into secure one-time password tokens .2 Sun H,Sun K,Wang Y,Jing J. Proc.of the 22nd ACM Conf.on Computer and Communications Security (CCS 2015) . 2015
[14]
Innovative instructions and software model for isolated execution .2 McKeen F,Alexandrovich I,Berenzon A,et al. Proceedings of the 2nd international Workshop on Hardware and Architectural Support for Security and Privacy(HASP) . 2013
[15]
ARM Security Technology .2 http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492Ctrustzonesecuritywhitepaper.pdf . 2015