2010
DOI: 10.1007/978-3-642-17499-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Green Secure Processors: Towards Power-Efficient Secure Processor Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Indeed, thanks to novel effective methods and techniques for energy efficiency, the most recent computerized systems can maintain high performances for the same Watt unit [7]. It could seem that if the factor of performance per Watt does not improve over time, the electrical costs for keeping the systems in an active state would end-up much higher than the price of the hardware [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, thanks to novel effective methods and techniques for energy efficiency, the most recent computerized systems can maintain high performances for the same Watt unit [7]. It could seem that if the factor of performance per Watt does not improve over time, the electrical costs for keeping the systems in an active state would end-up much higher than the price of the hardware [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…to external memory) are encrypted [33]. Although a number of memory encryption schemes have been proposed [34][35][36], they entail significant performance overhead (up to 25% performance overhead) [37]. Protection from replay, spoofing and splicing attacks can be achieved through memory authentication schemes that perform runtime integrity verification [7].…”
Section: Technical Challengesmentioning
confidence: 99%
“…The integrity of the code and data in memory is protected by maintaining memory integrity trees in order to preserve the state of the application. However, these security mechanisms are often computationally intensive and account for excessive memory access [37]. As memory accesses of code/data contribute to the largest fraction of energy consumed in embedded processors [38], such methods are often infeasible for embedded systems with tight functional constraints.…”
Section: Technical Challengesmentioning
confidence: 99%
See 2 more Smart Citations