Cryptographic-based initialization of memory content

作者: Pratyusa K. Manadhata , Stuart Haber , Amro J. Awad , William G. Horne

DOI:

关键词:

摘要: A technique includes receiving a request to initialize region of memory. Content that is stored in the encrypted based at least part on nonce value and key. The includes, response request, performing cryptographic-based initialization memory, including altering

参考文章(48)
Joseph E Gonzalez, Yucheng Low, Haijie Gu, Danny Bickson, Carlos Guestrin, None, PowerGraph: distributed graph-parallel computation on natural graphs operating systems design and implementation. pp. 17- 30 ,(2012) , 10.5555/2387880.2387883
William Stallings, Cryptography and network security ,(1998)
Richard L. Griswold, Ryan C. Conrad, William K. Nickless, System for processing an encrypted instruction stream in hardware ,(2014)
Alexander C. Sanks, Andrew W. Vogan, Nir Jacob Wakrat, Kenneth L. Herman, Daniel J. Post, Matthew J. Byom, Hari Hara Kumar Maharaj, Generating efficient reads for a system having non-volatile memory ,(2014)
Mark Hairgrove, Jerome F. Duluk, John Mashey, Cameron Buschardt, Brian Fahs, James Leroy Deming, Pcie traffic tracking hardware in a unified virtual memory system ,(2013)
Joseph James Sharkey, Ryan Matthew Wilson, Michael Joseph Sieffert, Method and system for reducing an impact of malware during a booting sequence ,(2010)