Proceedings of the 43rd Annual Conference on Design Automation - DAC '06 2006
DOI: 10.1145/1146909.1147042
|View full text |Cite
|
Sign up to set email alerts
|

A parallelized way to provide data encryption and integrity checking on a processor-memory bus

Abstract: This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking Engine), enabling to guarantee confidentiality and integrity of data exchanged between a SoC (System on Chip) and its external memory. The PE-ICE approach is based on an existing block-encryption algorithm to which the integrity checking capability is added. Simulation results show that the performance overhead of PE-ICE remains low (below 4%) compared to block-encryption-only systems (which provide data confiden… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 11 publications
0
28
0
Order By: Relevance
“…The external memory of an embedded system can face a variety of attacks (Elbaz, 2006), including the probing of the bus between the processor core and memory. Since the bus is exposed, an adversary can easily examine data and address values with little effort.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The external memory of an embedded system can face a variety of attacks (Elbaz, 2006), including the probing of the bus between the processor core and memory. Since the bus is exposed, an adversary can easily examine data and address values with little effort.…”
Section: Threat Modelmentioning
confidence: 99%
“…PE-ICE (Elbaz, 2006) uses the spreading feature of block ciphering algorithms for AES to provide system confidentiality and integrity. Like XOM, a tag is added to a data value before ciphering.…”
Section: Pe-icementioning
confidence: 99%
“…The external memory of an embedded system can face a variety of attacks [4] resulting from either the probing of the interface between a processor and the memory or physical attacks on the memory itself (fault injection). Bus probing results in the collection of address and data values which can be used to uncover processor behavior.…”
Section: Embedded System Memory Threatsmentioning
confidence: 99%
“…However, even encrypted data and their associated addresses leave memory values vulnerable to attack. Well-known attacks [4] include spoofing, relocation, and replay attacks. A spoofing attack occurs when an attacker places a random data value in memory, causing the system to malfunction.…”
Section: Embedded System Memory Threatsmentioning
confidence: 99%
See 1 more Smart Citation