The increasing need for security has caused system designers to consider placing some security support directly at the hardware level. In fact, this is starting to emerge as an important consideration in processor design, because the performance overhead of supporting security in hardware is usually significantly lower than a complete software solution. In this paper, we investigate integrating some security support into hardware. We show that security support can be added at some acceptable cost in area and performance. We propose a processor extension called ChipLock. It provides hardware security support for a mostly untrusted operating system to ensure the integrity and confidentiality of all computational results. ChipLock’s modular de...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Personal computer owners often want to be able to run security-critical programs on the same machine...
The increasing need for security has caused system designers to consider placing some security suppo...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Abstract--The technologies of computer security are more logic oriented. Designing a program with se...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
Processing and storage of confidential or critical information is an every day occurrence in computi...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Security is a system-wide problem which must include software solutions for update capability and ap...
International audienceA variety of applications are executing on a large untrusted computing base, w...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Security is a prime concern in the design of a wide variety of embedded systems and security process...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Personal computer owners often want to be able to run security-critical programs on the same machine...
The increasing need for security has caused system designers to consider placing some security suppo...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Abstract--The technologies of computer security are more logic oriented. Designing a program with se...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
Processing and storage of confidential or critical information is an every day occurrence in computi...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Security is a system-wide problem which must include software solutions for update capability and ap...
International audienceA variety of applications are executing on a large untrusted computing base, w...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Security is a prime concern in the design of a wide variety of embedded systems and security process...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Personal computer owners often want to be able to run security-critical programs on the same machine...