Proceedings of the 13th International Joint Conference on E-Business and Telecommunications 2016
DOI: 10.5220/0005955902390250
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Encrypted Microprocessor

Abstract: Abstract:This paper explores a new approach to encrypted microprocessing, potentiating new trade-offs in security versus performance engineering. The coprocessor prototype described runs standard machine code (32-bit OpenRISC v1.1) with encrypted data in registers, on buses, and in memory. The architecture is 'superscalar', executing multiple instructions simultaneously, and is sophisticated enough that it achieves speeds approaching that of contemporary off-the-shelf processor cores. The aim of the design is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 13 publications
(13 reference statements)
0
7
0
Order By: Relevance
“…Cryptoleq also depends on heuristic code-based obfuscation. There is a Open RISC implementation based on idea of HEROIC [53], but this is suffered from too much memory consumption because of big tables. The authors estimated it to be between hundreds of gigabytes to terabytes.…”
Section: A1 Processor Over Hementioning
confidence: 99%
“…Cryptoleq also depends on heuristic code-based obfuscation. There is a Open RISC implementation based on idea of HEROIC [53], but this is suffered from too much memory consumption because of big tables. The authors estimated it to be between hundreds of gigabytes to terabytes.…”
Section: A1 Processor Over Hementioning
confidence: 99%
“…Hardware aliasing arises nowadays notably in the context of encrypted computing [7,8,9,10,11,12,13]. That emerging technology is based on a processor in which inputs, outputs, and all intermediate values exist only in encrypted form.…”
Section: Introductionmentioning
confidence: 99%
“…This article explains recent advances in understanding and practice in the emerging technology of encrypted computing [1][2][3][4][5][6], in particular 'chaotic compilation' for this context [7], which supports the security proofs and now has broken through to allow essentially all extant ANSI C [8] source codes to be compiled (the known lacks are longjmp/setjmp), nearly as they stand (strict typing is necessary), opening up the field. An unexpected byproduct is an argument that obfuscation safe against polynomial time attacks is produced by this kind of compilation, perhaps even in the absence of encryption.…”
Section: Introductionmentioning
confidence: 99%