Matthew Hoekstra
Intel
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Matthew Hoekstra.
hardware and architectural support for security and privacy | 2013
Matthew Hoekstra; Reshma Lal; Pradeep M. Pappachan; Vinay Phegade; Juan Del Cuvillo
Software developers face a number of challenges when creating applications that attempt to keep important data confidential. Even with diligent attention paid to correct software design and implementation practices, secrets can still be exposed through a single flaw in any of the privileged code on the platform, code which may have been written by thousands of developers from hundreds of organizations throughout the world. Intel is developing innovative security technology which provides the ability for software developers to maintain control of the security of sensitive code and data by creating trusted domains within applications to protect critical information during execution and at rest. This paper will describe how this technology has been effectively used in lab exercises to protect private information in applications including enterprise rights management, video chat, trusted financial transactions, and others. Examples will include both protection of local processing and the establishment of secure communication with cloud services. It will illustrate useful software design patterns that can be followed to create many additional types of trusted software solutions.
trans. computational science | 2010
Siddhartha Chhabra; Yan Solihin; Reshma Lal; Matthew Hoekstra
Security continues to be an increasingly important concern in the design of modern systems. Many systems may have security requirements such as protecting the integrity and confidentiality of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. Making security guarantees has become even harder with the emergence of hardware attacks where the attacker has physical access to the system and can bypass any software security mechanisms employed. To this end, researchers have proposed Secure Processor architectures that provide protection against hardware attacks using platform features. In this paper, we analyze three of the currently proposed secure uniprocessor designs in terms of their security, complexity of hardware required and performance overheads: eXecute Only Memory (XOM), Counter mode encryption and Merkle tree based authentication, and Address Independent Seed Encryption and Bonsai Merkle Tree based authentication. We then provide a discussion on the issues in securing multiprocessor systems and survey one design each for Shared Memory Multiprocessors and Distributed Shared Memory Multiprocessors. Finally, we discuss future directions in Secure Processor research which have largely been ignored forming the weakest link in the security afforded by the proposed schemes, namely, Secure booting and Secure configuration. We identify potential issues which can serve to form the foundation of further research in secure processors.
Archive | 1999
Matthew Hoekstra
Archive | 1999
Craig Langfahl; Matthew Hoekstra; Maynard C. Falconer
Archive | 2003
James R. Trethewey; Dhananjay V. Keskar; Matthew Hoekstra; Uma M. Gadamsetty; Manoj Agnihotri
Archive | 2003
Dhananjay V. Keskar; Matthew Hoekstra
Archive | 2007
Stephen J. Tolopka; David A. Koufaty; John I. Garney; Yasser Rasheed; Ulhas Warrier; Matthew Hoekstra
Archive | 2003
Matthew Hoekstra
Archive | 2014
Reshma Lal; Matthew Hoekstra
Archive | 2013
Jason Martin; Matthew Hoekstra