Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wilfred E. Plouffe is active.

Publication


Featured researches published by Wilfred E. Plouffe.


computer and communications security | 2009

Effective implementation of the cell broadband engine™ isolation loader

Masana Murase; Kanna Shimizu; Wilfred E. Plouffe; Masaharu Sakamoto

This paper presents the design and implementation of the Cell Broadband Engine TM(Cell/B.E.) isolation loader which is a part of the IBM Software Development Kit for Multicore Acceleration [14]. Our isolation loader is a key component in realizing secure application boot and encrypted application execution. During the application load process, the isolation loader fetches, validates, and decrypts a Synergistic Processor Element (SPE) executable, establishing a chain of trust from the hardware to the application. Since not all applications are SPE executables, we also introduce a general solution. This is a verification service framework in which all applications including system functions can be verified by the isolation loader immediately before execution. We have applied several novel implementation techniques to the isolation loader. The countermeasure implemented in our isolation loader against the substituted-ciphertext attack is given and our staging technique to allocate contiguous working areas for applications is also introduced. The load overhead of this loader including application fetch, validation (RSA-2048/SHA-1), and decryption (RSA-2048 and AES) is less than 50 milliseconds on the 2.8 GHz IBM PowerXCell 8i processor. This overhead is reasonable compared with the 500-millisecond 2048-bit RSA signing needed by the Trusted Platform Module chips [3].


Archive | 2009

Tamper-resistant trusted java virtual machine and method of using the same

Hongxia Jin; Donald Leake; Jeffrey Bruce Lotspiech; Sigfredo I. Nin; Wilfred E. Plouffe


Archive | 2002

Method, system and program product for modifying content usage conditions during content distribution

Eric M. Foster; Jeffrey Bruce Lotspiech; Dalit Naor; Sigfredo I. Nin; Florian Pestoni; Wilfred E. Plouffe; Frank A. Schaffa


Archive | 2008

Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient

Eric M. Foster; Jeffrey Bruce Lotspiech; Florian Pestoni; Wilfred E. Plouffe; Frank A. Schaffa


Archive | 2002

Method, system and program product for managing a size of a key management block during content distribution

Eric M. Foster; Jeffrey Bruce Lotspiech; Florian Pestoni; Wilfred E. Plouffe; Frank A. Schaffa


Archive | 1992

Method and means for tetrahedron/octahedron packing and tetrahedron extraction for function approximation

James M. Kasson; Wilfred E. Plouffe


Archive | 2007

Support for Multiple Security Policies on a Unified Authentication Architecture

Masana Murase; Wilfred E. Plouffe; Kanna Shimizu; Vladimir Zbarsky


Archive | 2007

Cryptographic secure program overlays

Masana Murase; Wilfred E. Plouffe; Kanna Shimizu; Masaharu Sakamoto; Vladimir Zbarsky


Archive | 2007

Updateable Secure Kernel Extensions

Wilfred E. Plouffe; Kanna Shimizu; Vladimir Zbarsky


Archive | 1992

Volummetric linear interpolation

James Lee Hafner; Wilfred E. Plouffe

Researchain Logo
Decentralizing Knowledge