http://palms.ee.princeton.edu/sp_bastion
SecureME's cloaking was interesting:
https://docs.google.com/file/d/0B1i_Zf52vJctMTA4YTI1MmUtNzdj...
HIDE - an infrastructure for efficiently protecting information leakage on the address bus http://www.cc.gatech.edu/people/home/santosh/papers/asplos20...
Using address independent seed encryption and bonsai Merkle Trees to make secure processors OS- and performance-friendly http://www.ece.ncsu.edu/arpers/Papers/micro07-brian.pdf
Embedded Software Security through Key-Based Control Flow Obfuscation http://engr.case.edu/bhunia_swarup/papers/C/C80.pdf
Memory encryption: Survey of Existing Techniques http://www.thayer.dartmouth.edu/tr/reports/tr13-001.pdf
ASIST - architecture support for instruction set randomization http://www.ics.forth.gr/_publications/papadog-asist-ccs.pdf
Hardware architectures for software security http://scholar.lib.vt.edu/theses/available/etd-10112006-2048...
http://palms.ee.princeton.edu/sp_bastion
SecureME's cloaking was interesting:
https://docs.google.com/file/d/0B1i_Zf52vJctMTA4YTI1MmUtNzdj...
HIDE - an infrastructure for efficiently protecting information leakage on the address bus http://www.cc.gatech.edu/people/home/santosh/papers/asplos20...
Using address independent seed encryption and bonsai Merkle Trees to make secure processors OS- and performance-friendly http://www.ece.ncsu.edu/arpers/Papers/micro07-brian.pdf
Embedded Software Security through Key-Based Control Flow Obfuscation http://engr.case.edu/bhunia_swarup/papers/C/C80.pdf
Memory encryption: Survey of Existing Techniques http://www.thayer.dartmouth.edu/tr/reports/tr13-001.pdf
ASIST - architecture support for instruction set randomization http://www.ics.forth.gr/_publications/papadog-asist-ccs.pdf
Hardware architectures for software security http://scholar.lib.vt.edu/theses/available/etd-10112006-2048...