With more computing platforms connected to the Internet each day, computer system security has become a critical issue. One of the major security problems is execution of malicious injected code. In this paper we propose new processor extensions that allow execution of trusted instructions only. The proposed extensions verify instruction block signatures in run-time. Signatures are generated during a trusted installation process, using a multiple input signature register (MISR), and stored in an encrypted form. The coefficients of the MISR and the key used for signature encryption are based on a hidden processor key. Signature verification is done in the background, concurrently with program execution, thus reducing negative impact on perfo...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
Preventing execution of unauthorized software on a given computer plays a pivotal role in system sec...
Secure processors have been recently introduced, which enable new applications involving software an...
With more computing platforms connected to the Internet each day, computer system security has becom...
Most of today’s computers are connected to the Internet or at least to a local network, exposing sys...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
One of the most common forms of security attacks involves exploiting a vulnerability to inject malic...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...
Power-based side channel attacks are a significant security risk, especially for embedded applicatio...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
Preventing execution of unauthorized software on a given computer plays a pivotal role in system sec...
Secure processors have been recently introduced, which enable new applications involving software an...
With more computing platforms connected to the Internet each day, computer system security has becom...
Most of today’s computers are connected to the Internet or at least to a local network, exposing sys...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
One of the most common forms of security attacks involves exploiting a vulnerability to inject malic...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
Abstract. Power-based side channel attacks are a significant security risk, especially for embedded ...
Power-based side channel attacks are a significant security risk, especially for embedded applicatio...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
Preventing execution of unauthorized software on a given computer plays a pivotal role in system sec...
Secure processors have been recently introduced, which enable new applications involving software an...