2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PHD Forum 2011
DOI: 10.1109/ipdps.2011.158
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Security for Communications and Memories in a Multiprocessor Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…Other works provide solutions for the protection of embedded systems: Huffmire et al [7] introduce the approach of physi-cal isolation using moats and drawbridges; ARM proposes a commercial architecture name Trustzone [8] which is based on a normal/secure separation using a secure kernel and an access driver. This work is an in-depth description and implementation study of the solution introduced in [2]. It takes advantages of both NoC/bus-based approaches by proposing hardware security enhancements distributed on each IP with low-latency control features.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Other works provide solutions for the protection of embedded systems: Huffmire et al [7] introduce the approach of physi-cal isolation using moats and drawbridges; ARM proposes a commercial architecture name Trustzone [8] which is based on a normal/secure separation using a secure kernel and an access driver. This work is an in-depth description and implementation study of the solution introduced in [2]. It takes advantages of both NoC/bus-based approaches by proposing hardware security enhancements distributed on each IP with low-latency control features.…”
Section: Related Workmentioning
confidence: 99%
“…8, 16 and 32 bits) and cryptographic information (confidentiality/authentication modes, encryption key and MAC). Threat model defined in [2] is covered using these parameters. Timestamp tags are used to monitor the access time to the external memory (to detect replay attacks).…”
Section: B Security Policiesmentioning
confidence: 99%
See 1 more Smart Citation
“…This work focuses on an FPGA implementation of a adaptive version of the work presented in [1]. It is inspired by [6] with an implementation specific to the AXI bus standard with a low area/latency trade-off.…”
Section: Related Workmentioning
confidence: 99%
“…Section 2 presents related work. Section 3 summarizes a static solution defined in [1]. Section 4 describes our contribution and Sections 5 and 6 propose several results and analysis.…”
Section: Introductionmentioning
confidence: 99%