A persistent problem with program execution, despite numerous mitigation attempts, is its inherent vulnerability to the injection of malicious code. Equally unsolved is the susceptibility of firmware to reverse engineering, which undermines the manufacturer\u27s code confidentiality. We propose an approach that solves both kinds of security problems employing instruction-level code encryption combined with the use of a physical unclonable function (PUF). Our novel Secure Execution PUF-based Processor (SEPP) architecture is designed to minimize the attack surface, as well as performance impact, and requires no significant changes to the development process. This is possible based on a tight integration of a PUF directly into the processor\u2...
With more computing platforms connected to the Internet each day, computer system security has becom...
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-inj...
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
In his invited talk, joint between CHES 2016 and CRYPTO 2016 on the Future of Embedded Security, Pau...
Secure processors have been recently introduced, which enable new applications involving software an...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
During the secure boot process for a trusted execution environment, the processor must provide a cha...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a rea...
With more computing platforms connected to the Internet each day, computer system security has becom...
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-inj...
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
In his invited talk, joint between CHES 2016 and CRYPTO 2016 on the Future of Embedded Security, Pau...
Secure processors have been recently introduced, which enable new applications involving software an...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
During the secure boot process for a trusted execution environment, the processor must provide a cha...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a rea...
With more computing platforms connected to the Internet each day, computer system security has becom...
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-inj...
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...