With more computing platforms connected to the Internet each day, computer system security has become a critical issue. One of the major security problems is execution of malicious injected code. In this paper we propose new processor extensions that allow execution of trusted instructions only. The proposed extensions verify instruction block signatures in run-time. Signatures are generated during a trusted installation process, using a multiple input signature register (MISR), and stored in an encrypted form. The coefficients of the MISR and the key used for signature encryption are based on a hidden processor key. Signature verification is done in the background, concurrently with program execution, thus reducing negative impact on perfo...
Preventing execution of unauthorized software on a given computer plays a pivotal role in system sec...
Secure processors have been recently introduced, which enable new applications involving software an...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...
With more computing platforms connected to the Internet each day, computer system security has becom...
Most of today’s computers are connected to the Internet or at least to a local network, exposing sys...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
One of the most common forms of security attacks involves exploiting a vulnerability to inject malic...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
Power-based side channel attacks are a significant security risk, especially for embedded applicatio...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
Preventing execution of unauthorized software on a given computer plays a pivotal role in system sec...
Secure processors have been recently introduced, which enable new applications involving software an...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...
With more computing platforms connected to the Internet each day, computer system security has becom...
Most of today’s computers are connected to the Internet or at least to a local network, exposing sys...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
One of the most common forms of security attacks involves exploiting a vulnerability to inject malic...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
Power-based side channel attacks are a significant security risk, especially for embedded applicatio...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
Preventing execution of unauthorized software on a given computer plays a pivotal role in system sec...
Secure processors have been recently introduced, which enable new applications involving software an...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...