Jin S,Huh J.Secure MMU:Architectural support for memory isolation among virtual machines[C]∥Proc of 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSNW),2011:217222.
[2]
Kalagiakos P,Bora M. Cloud security tactics:Virtualization and the VMM[C]∥Proc of the 6th International Conference on Application of Information and Communication Technologies (AICT),2012:16.
[3]
Sarmenta L F G,Van Dijk M, O'Donnell C W, et al. Virtual monotonic counters and countlimited objects using a TPM without a trusted OS[C]∥Proc of the 1st ACM Workshop on Scalable Trusted Computing, 2006:2742.
[4]
Levin D,Douceur J R, Lorch J R,et al.TrInc:Small trusted hardware for large distributed systems[C]∥Proc of NSDI’09, 2009:114.
[5]
Fletcher C W,Dijk M,Devadas S.A secure processor architecture for encrypted computation on untrusted programs[C]∥Proc of the 7th ACM Workshop on Scalable Trusted Computing,2012:38.
[6]
Fletcher C W,Ren L,Yu X,et al.Suppressing the oblivious RAM timing channel while making information leakage and program efficiency tradeoffs[C]∥Proc of HPCA’14, 2014:213224.
[7]
Ren L,Yu X,Fletcher C W,et al.Design space exploration and optimization of path oblivious RAM in secure processors[C]∥Proc of the 40th Annual International Symposium on Computer Architecture, 2013:571582.
[8]
ARM security technologybuilding a secure system using TrustZone technology comments.ARM technical white paper[EB/OL].[20090410].http://infocenter.arm.com/help/topic/com.arm.doc.prd29genc009492c/PRD29GENC009492C_trustzone_security_whitepaper.pdf.
[9]
Petrot F,Fournel N,Gerin P,et al.On MPSoC software execution at the transaction level[J]. IEEE Design and Test of Computers, 2011, 28(3):3243.
[10]
Bellard F.QEMU,a fast and portable dynamic translator[C]∥Proc of USENIX Annual Technical Conference, 2005:4146.
[11]
TIMA Lab.RABBITS:An environment for fast and accurate MPSoC simulation[EB/OL].[20140312].http://tima.imag.fr/sls/researchprojects/rabbits/.