参考文献
[1]Lie D J F, Thekkath C A, Mitchell M, et al. Architectural support for copy and tamper resistant software[J]. ACM SIGARCH Computer Architecture News, 2000, 28(5): 168177[2]Suh G E, Clarke D, Gassend B, et al. AEGIS: Architecture for tamperevident and tamperresistant processing[C] Proc of the 25th ACM Int Conf on Supercomputing Anniversary Volume. New York: ACM, 2003: 357368[3]McKeen F, Alexandrovich I, Berenzon A, et al. Innovative Instructions and Software Model for Isolated Execution[M]. New York: ACM, 2013[4]Hussain S, Guo H. A low performanceoverhead ORAM design for processor system with untrusted offchip memory[C] Proc of the 2nd IEEE Int Conf on Automation, Electronics and Electrical Engineering. Piscataway, NJ: IEEE, 2019: 2224[5]Goldreich O. Towards a theory of software protection and simulation by oblivious RAMs[C] Proc of the 19th Annual ACM Symp on Theory of Computing. New York: ACM, 1987: 182194[6]Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs[J]. Journal of the ACM, 1996, 43(3): 431473[7]Maas M, Love E, Stefanov E, et al. Phantom: Practical oblivious computation in a secure processor[C] Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 311324[8]Fletcher C W, Ren L, Kwon A, et al. A lowlatency, lowarea hardware oblivious RAM controller[C] Proc of the 23rd IEEE Annual Int Symp on FieldProgrammable Custom Computing Machines. Piscataway, NJ: IEEE, 2015: 215222[9]Shafiee A, Balasubramonian R, Tiwari M, et al. Secure DIMM: Moving ORAM primitives closer to memory[C] Proc of IEEE Int Symp on High Performance Computer Architecture. Los Alamitos, CA: IEEE Computer Society, 2018: 428440[10]Wang Rujia, Zhang Youtao, Yang Jun. DORAM: PathORAM delegation for low execution interference on cloud servers with untrusted memory[C] Proc of IEEE Int Symp on High Performance Computer Architecture. Los Alamitos, CA: IEEE Computer Society, 2018: 416427[11]Batcher K E. Sorting networks and their applications[C] Proc of the Spring Joint Computer Conf. New York: ACM, 1968: 307314[12]Wu M, Lu W. On target coverage problem of angle rotatable directional sensor networks[C] Proc of the 7th Int Conf on Innovative Mobile & Internet Services in Ubiquitous Computing. Los Alamitos, CA: IEEE Computer Society, 2013: 605610[13]Xie D, Li G, Yao B, et al. Practical private shortest path computation based on oblivious storage[C] Proc of the 32nd IEEE Int Conf on Data Engineering. Piscataway, NJ: IEEE, 2016: 361372[14]Stefanov E, Shi E, Song D. Towards practical oblivious RAM[J]. arXiv preprint, arXiv:1106.3652, 2011[15]Shi E, Chan TH H, Stefanov E, et al. Oblivious RAM with O((logN)3) worstcase cost[C] Proc of the 17th Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2011: 197214 [16]Stefanov E, Van Dijk M, Shi E, et al. Path ORAM: An extremely simple oblivious RAM protocol[J]. Journal of the Association for Computing Machinery, 2018, 65(4): 18.118.26[17]Fletcher C W, Ren L, Kwon A, et al. Freecursive ORAM:[Nearly] free recursion and integrity verification for positionbased oblivious RAM[J]. ACM SiGPLAN Notices, 2015, 50(3): 103116[18]Ren L, Fletcher C W, Kwon A, et al. Design and implementation of the ascend secure processor[J]. IEEE Trans on Dependable and Secure Computing, 2019, 16(2): 204216[19]Burger D, Austin T M. The SimpleScalar tool set, version 2.0[J]. ACM SIGARCH Computer Architecture News, 1997, 25(3): 1325[20]Rukhin A, Soto J, Nechvatal J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[J]. Nist Special Publication, 2001, 5: 80022[21]国家密码管理局. SM2椭圆曲线公钥密码算法[EBOL]. 2010[20221025]. http:www.oscca.gov.cnNews201012News_1197.htm[22]Guthaus M R, Ringenberg J S, Ernst D, et al. Mibench: A free, commercially representative embedded benchmark suite[C] Proc of the 4th Annual IEEE Int Workshop on Workload Characterization. Piscataway, NJ: IEEE, 2001: 314
|