Author image not provided
 Siddhartha Chhabra

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article12.57
Citation Count88
Publication count7
Publication years2007-2011
Available for download4
Average downloads per article740.50
Downloads (cumulative)2,962
Downloads (12 Months)174
Downloads (6 Weeks)14
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1 published by ACM
June 2011 ISCA '11: Proceedings of the 38th annual international symposium on Computer architecture
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 2,   Downloads (12 Months): 73,   Downloads (Overall): 981

Full text available: PDFPDF
Emerging technologies for building non-volatile main memory (NVMM) systems suffer from a security vulnerability where information lingers on long after the system is powered down, enabling an attacker with physical access to the system to extract sensitive information off the memory. The goal of this study is to find a ...
Keywords: incremental encryption, hardware attacks, non-volatile main memory, privacy, security
Also published in:
June 2011  ACM SIGARCH Computer Architecture News - ISCA '11: Volume 39 Issue 3, June 2011

2 published by ACM
May 2011 ICS '11: Proceedings of the international conference on Supercomputing
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 9,   Downloads (12 Months): 53,   Downloads (Overall): 934

Full text available: PDFPDF
With computing increasingly becoming more dispersed, relying on mobile devices, distributed computing, cloud computing, etc. there is an increasing threat from adversaries obtaining physical access to some of the computer systems through theft or security breaches. With such an untrusted computing node, a key challenge is how to provide secure ...
Keywords: hardware attacks, operating systems, security, cloaking

3
January 2010 Transactions on computational science X: special issue on security in computing, part I
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity ...
Keywords: secure processor architectures, memory encryption, embedded systems security, memory authentication, power analysis

4
January 2010 Transactions on computational science VII
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Security continues to be an increasingly important concern in the design of modern systems. Many systems may have security requirements such as protecting the integrity and confidentiality of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. Making security guarantees has ...
Keywords: secure booting, secure processor architectures, memory encryption, secure configuration, memory authentication

5
October 2009 ICCD'09: Proceedings of the 2009 IEEE international conference on Computer design
Publisher: IEEE Press
Bibliometrics:
Citation Count: 3

Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread ...

6 published by ACM
March 2009 ACM Transactions on Architecture and Code Optimization (TACO): Volume 5 Issue 4, March 2009
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 24,   Downloads (Overall): 694

Full text available: PDFPDF
In today's digital world, computer security issues have become increasingly important. In particular, researchers have proposed designs for secure processors that utilize hardware-based memory encryption and integrity verification to protect the privacy and integrity of computation even from sophisticated physical attacks. However, currently proposed schemes remain hampered by problems that ...
Keywords: Secure processor architectures, memory encryption, virtualization, memory integrity verification

7
December 2007 MICRO 40: Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 36
Downloads (6 Weeks): 1,   Downloads (12 Months): 25,   Downloads (Overall): 354

Full text available: PDFPDF
In today's digital world, computer security issues have become increasingly important. In particular, researchers have proposed designs for secure processors which utilize hardware-based mem- ory encryption and integrity verification to protect the privacy and integrity of computation even from sophisticated physical attacks. However, currently proposed schemes remain hampered by prob- ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us