Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) 2006
DOI: 10.1109/hicss.2006.114
|View full text |Cite
|
Sign up to set email alerts
|

Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms

Abstract: Software protection is increasingly necessary for a number of applications, ranging from commercial systems and digital content distributors, to military systems exposed in the field of operations. As computing devices become more pervasive, and software more complex, insufficiencies with current software protection mechanisms have arisen. Software-only and data-only protection systems have resulted in broken systems that are vulnerable to loss of software confidentiality and integrity.A growing number of rese… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Some of these processors are efficient but do not cover our threat model defined in a further section. In [6] authors describe a solution (called SecSoft) to protect software with a hardware Encryption Management Unit (EMU). This work proposes a latency analysis of several modes (block/counter modes for encryption function and with/without encryption).…”
Section: Memory Protection Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Some of these processors are efficient but do not cover our threat model defined in a further section. In [6] authors describe a solution (called SecSoft) to protect software with a hardware Encryption Management Unit (EMU). This work proposes a latency analysis of several modes (block/counter modes for encryption function and with/without encryption).…”
Section: Memory Protection Approachesmentioning
confidence: 99%
“…Such a solution allows reducing the cryptography latency overhead while maintaining a strong level of protection. Compared to [6,7], we rely on a more comprehensive security policy where developer can finely tune his/her cryptography needs. Then, this work also presents a feedback feature for security mechanisms (Section 4): that is to say how attacks are detected and how the update manager takes care of these information.…”
Section: Main Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…1. Another major focus has been the encryption [17][18][19] of software in the XOM approach via a crypto controller inserted between program memory and processor [20][21][22][23] . For embedded systems, however, we have to consider that a factor of 100 more embedded processors systems with hard cost constraints are produced than powerful general purpose processors (GPP).…”
Section: Introductionmentioning
confidence: 99%