Hirdetés

Keresés

Hirdetés

Új hozzászólás Aktív témák

  • P.H.

    senior tag

    válasz drkbl #8 üzenetére

    Igen, ahogy mondod, mint a TXT. Nem lehet nem észrevenni a hasonlóságot a 3 megoldás között:

    Intel Trusted Execution Technology, amit linkeltél: "It consists of a series of hardware enhancements, to allow for the creation of multiple separated execution environments, or partitions. One component is called the TPM (Trusted platform module), which allows for secure key generation and storage, and authenticated access to data encrypted by this key. Note, however, that the private key stored in the TPM is generally not available to the owner of the machine, and never leaves the chip under normal operation."

    Via Isaiah (2008) Volatile Secure Memory: A “volatile secure memory” (VSM) area exists that can be loaded or stored with special x86 instructions (available only in a new secure execution” mode). Data in this area has its own address space and never appears on the bus on in the caches. This is a unique VIA Isaiah Architecture addition to the x86 architecture, intended for use by a specialized “secure code” monitor.
    "In addition, the VIA Isaiah Architecture contains some new (and unique to VIA) features for a very specialized “secure execution mode”. These include a secure on-chip memory area, encrypted instruction fetching, and more."

    ARM TrustZone: Trusted applications that work on a TrustZone technology-based SoC running a Trusted Execution Environment, separated from the main OS, protect from software/malware attack. The TrustZone switch into secure mode provides hardware backed isolation.

    [ Szerkesztve ]

    Arguing on the Internet is like running in the Special Olympics. Even if you win, you are still ... ˙˙˙ Real Eyes Realize Real Lies ˙˙˙

Új hozzászólás Aktív témák