Secure boot has enabled computer systems to verify software integrity for decades but these proven techniques cost too much in terms of time and processing power for automotive safety controllers. Low power microcontrollers with unforgiving real-time requirements have limited time available to complete the image check and must efficiently use on-chip memory. Functional safety systems restrict when the check may be conducted in cyber-physical systems. And lastly, the system must be able to maintain security through multiple cycles of remote, unsupervised operation. Safety architectures push towards checking the memory for the next boot cycle, but sampling-based authentication speeds the process to allow verification of the current boot cyc...
The increasing need for security has caused system designers to consider placing some security suppo...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
With the proliferation of the Internet of Things (IoT), the need to prioritize the overall system se...
Fingerprinting summarizes the history of internal processor state updates into a cryptographic signa...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
Building hardware security primitives with on-device memory fingerprints is a compelling proposition...
Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheape...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwo...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The increasing need for security has caused system designers to consider placing some security suppo...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
With the proliferation of the Internet of Things (IoT), the need to prioritize the overall system se...
Fingerprinting summarizes the history of internal processor state updates into a cryptographic signa...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
Building hardware security primitives with on-device memory fingerprints is a compelling proposition...
Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheape...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwo...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The increasing need for security has caused system designers to consider placing some security suppo...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
With the proliferation of the Internet of Things (IoT), the need to prioritize the overall system se...