[1] ARM Ltd.Security technology-building a secure system using TrustZone technology[EB/OL].[2021-01-04].https://developer.arm.com/documentation/PRD29-GENC-009492/c. [2] HUANG A.Keeping secrets in hardware:the Microsoft XboxTM case study[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2002:213-227. [3] HOTZ G.PS3 glitch hack[EB/OL].[2021-01-04].https://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/. [4] SOLUTIONS E.Analysis tools for DDR1, DDR2, DDR3, embedded DDR and fully buffered DIMM modules[EB/OL].[2021-01-04].http://www.epnsolutions.net/ddr.html. [5] MÜLLER T, SPREITZENBARTH M.Frost:forensic recovery of scrambled telephones[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Berlin, Germany:Springer, 2014:373-388. [6] FS2334 DDR2800 MT/s DIMM analysis probe-FuturePlus systems[EB/OL].[2021-01-04].https://www.yumpu.com/en/document/read/41592980/fs2334-ddr2-800-mt-s-dimm-analysis-probe-futureplus-systems. [7] NCC Group.TPM genie tool[EB/OL].[2021-01-04].https://github.com/nccgroup/TPMGenie. [8] HALDERMAN J A, SCHOEN S D, HENINGER N, et al.Lest we remember[J].Communications of the ACM, 2009, 52(5):91-98. [9] Gitee.Optee_test[EB/OL].[2021-02-05].https://gitee.com/iamwjia/optee_test. [10] 杨阳, 关志, 陈钟.冷启动攻击研究综述[J].计算机应用研究, 2015, 32(10):2886-2890. YANG Y, GUAN Z, CHEN Z.Survey of cold boot attack[J].Application Research of Computers, 2015, 32(10):2886-2890.(in Chinese) [11] NEUGSCHWANDTNER M, BEITLER A, KURMUS A.A transparent defense against USB eavesdropping attacks[C]//Proceedings of the 9th European Workshop on System Security.New York, USA:ACM Press, 2016:1-6. [12] MÜLLER T, DEWALD A, FREILING F C.AESSE:a cold-boot resistant implementation of AES[C]//Proceedings of the 3rd European Workshop on System Security.New York, USA:ACM Press, 2010:42-47. [13] MÜLLER T, FREILING F C, DEWALD A.TRESOR runs encryption securely outside RAM[C]//Proceedings of the 20th USENIX Security Symposium.New York, USA:ACM Press, 2011:1-17. [14] SIMMONS P.Security through amnesia:a software-based solution to the cold boot attack on disk encryption[C]//Proceedings of the 27th Annual Computer Security Applications Conference.New York, USA:ACM Press, 2011:73-82. [15] GARMANY B, MÜLLER T.PRIME:private RSA infrastructure for memory-less encryption[C]//Proceedings of the 29th Annual Computer Security Applications Conference.New York, USA:ACM Press, 2013:149-158. [16] VASILIADIS G, ATHANASOPOULOS E, POLYCHRONAKIS M, et al.PixelVault:using GPUs for securing cryptographic operations[C]//Proceedings of 2014 ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM, 2014:1131-1142. [17] PETERSON P A H.Cryptkeeper:improving security with encrypted RAM[C]//Proceedings of 2010 IEEE International Conference on Technologies for Homeland Security.Washington D.C., USA:IEEE Press, 2010:120-126. [18] COLP P, ZHANG J W, GLEESON J, et al.Protecting data on smartphones and tablets from memory attacks[C]//Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems.New York, USA:ACM Press, 2015:177-189. [19] GÖTZFRIED J, MÜLLER T, DRESCHER G, et al.RamCrypt:kernel-based address space encryption for user-mode processes[C]//Proceedings of the 11th ACM Asia Conference on Computer and Communications Security.New York, USA:ACM Press, 2016:919-924. [20] GUAN L, CAO C, ZHU S C, et al.Protecting mobile devices from physical memory attacks with targeted encryption[C]//Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks.New York, USA:ACM Press, 2019:34-44. [21] FERGUSON N.AES-CBC + Elephant diffuser:a disk encryption algorithm for Windows Vista[EB/OL].[2021-01-04].http://people.eecs.berkeley.edu/~raluca/cs261-f15/readings/bitlocker.pdf. [22] BROZ M, KOZINA O, WAGNER A, et al.dm-crypt:Linux kernel device-mapper crypto target[EB/OL].[2021-01-04].https://gitlab.com/cryptsetup/cryptsetup/wikis/DMCrypt. [23] ZHAO S J, ZHANG Q Y, HU G Y, et al.Providing root of trust for ARM TrustZone using on-chip SRAM[C]//Proceedings of the 4th International Workshop on Trustworthy Embedded Devices.New York, USA:ACM Press, 2014:25-36. |