Filters








1,301 Hits in 4.2 sec

Challenges in designing trustworthy cryptographic co-processors

Ricardo Graves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang
2015 2015 IEEE International Symposium on Circuits and Systems (ISCAS)  
The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.  ...  CONCLUSION This paper highlights the challenges in designing trustworthy cryptographic systems, with an emphasis on the existing attacks to their implementations.  ...  This creates the challenge of designing cryptographic systems that are efficient while at the same time robust against attacks.  ... 
doi:10.1109/iscas.2015.7169070 dblp:conf/iscas/GravesNBBEFMPRR15 fatcat:lx6ksv3akbet5f25ghsqdl4r2q

Trusted Hardware: Can It Be Trustworthy?

Cynthia E. Irvine, Karl Levitt
2007 Proceedings - Design Automation Conference  
This includes data such as cryptographic keys, personal information, and the intellectual property (IP) in the device's design.  ...  Furthermore, computing systems in critical applications must work as specified. Therefore it is important that hardware be designed and fabricated to be trustworthy.  ...  Types of Trustworthy Hardware Cryptographic co-processors can range from NICs with built-in cryptographic algorithms to those such as the IBM 4758 which was designed to detect and respond to tampering  ... 
doi:10.1109/dac.2007.375041 fatcat:2djezi6ojzaatjxb4qfdmbqfju

Secure architecture for embedded systems

Michael Vai, Ben Nahill, Josh Kramer, Michael Geis, Dan Utin, David Whelihan, Roger Khazan
2015 2015 IEEE High Performance Extreme Computing Conference (HPEC)  
However, the co--design of security with functionality has to 9 overcome a major challenge; rarely can the security requirements be accurately identified when the 10 design begins. 11 This paper gives  ...  The development of a hypothetical secure embedded 15 system for an unmanned aerial system (UAS) is used to illustrate our co--design methodology.  ...  architecture that uses 139 a security co--processor (S--COP) to secure a mainstream CPU.  ... 
doi:10.1109/hpec.2015.7322461 dblp:conf/hpec/VaiNKGUWK15 fatcat:4w4wqbxjh5birh5z6biufx7z24

A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors [chapter]

Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, Çetin Kaya Koç, Timothy Levin, Timothy Sherwood
2012 Lecture Notes in Computer Science  
crypto co-processors.  ...  3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware community.  ...  Therefore, we must design integrated cryptographic co-processors that operate in isolation from the processes running on the CPUs.  ... 
doi:10.1007/978-3-642-28368-0_24 fatcat:awazjhiszrbl5mnz2225ktl4ra

An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments [article]

Jämes Ménétrey, Christian Göttel, Marcelo Pasin, Pascal Felber, Valerio Schiavoni
2022 arXiv   pre-print
When used in conjunction with trusted execution environments, it guarantees that genuine code is executed even when facing strong attackers, paving the way for adoption in several sensitive application  ...  It exploits a closed Arm Cortex-v5 processor as a secure co-processor, used to generate cryptographic materials kept in the CPU.  ...  Mutual attestation protocols have been designed to appraise the trustworthiness of both end devices involved in a communication.  ... 
arXiv:2204.06790v2 fatcat:vx56vhjfunarlooogupiq6st2u

Attestation Mechanisms for Trusted Execution Environments Demystified [article]

Jämes Ménétrey, Christian Göttel, Anum Khurshid, Marcelo Pasin, Pascal Felber, Valerio Schiavoni, Shahid Raza
2022 arXiv   pre-print
When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive  ...  It exploits a closed Arm Cortex-v5 processor as a secure co-processor, used to generate cryptographic materials kept in the CPU.  ...  Researchers used hardware/software co-design techniques to propose a hybrid design with a formal proof of correctness [40] .  ... 
arXiv:2206.03780v1 fatcat:jzzts4cbcvbbvdqsao5yoxzefq

Hardware assistance for trustworthy systems through 3-D integration

Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia Irvine, Timothy Levin
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
In a developed example we show how this approach can increase system trustworthiness, through mitigating the cache-based side channel problem by routing signals from the computation plane through a cache  ...  Furthermore, as chips increase in complexity, trustworthy processing of sensitive information can become increasingly difficult to achieve due to extensive on-chip resource sharing and the lack of corresponding  ...  This research was funded in part by National Science Foundation Grant CNS-0910734.  ... 
doi:10.1145/1920261.1920292 dblp:conf/acsac/ValamehrTSKHIL10 fatcat:4xejcxhygnayfdyypj7wsb4dtu

Security and Privacy Challenges in Cyber-Physical Systems

Fahd AlDosari
2017 Journal of Information Security  
We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric  ...  Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources.  ...  Moreover, there are challenges in maintaining the same required level of accuracy, reliability, and performance of all system parts, in addition to problems in the design phase of such systems, difficulties  ... 
doi:10.4236/jis.2017.84019 fatcat:p6fbike43rfvhkafxmmk6v6uaa

TEE-based protection of cryptographic keys on embedded IoT devices

Dorottya Papp, Máté Zombor, Levente Buttyán
2021 Annales Mathematicae et Informaticae  
Our approach provides similar protection as secure co-processors, but does not actually require an additional secure hardware element.  ...  In this work we propose to protect cryptographic keys in embedded IoT devices using a Trusted Execution Environment (TEE) which is supported on many embedded platforms.  ...  However, requiring an additional co-processor on every IoT device would be too expensive in most cases.  ... 
doi:10.33039/ami.2021.02.002 fatcat:kyqxbbqfvrhyhle4bl4nxrawim

Increasing the trustworthiness of commodity hardware through software

Kevin Elphinstone, Yanyan Shen
2013 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
This paper discusses improving the trustworthiness of commodity hardware to enable a verified microkernel to be used in some situations previously needing separate computers.  ...  We explore leveraging multicore processors to provide redundancy, and report the results of our initial performance investigation.  ...  In this paper, we have explored leveraging redundant processors to improve the trustworthiness of COTS hardware.  ... 
doi:10.1109/dsn.2013.6575328 dblp:conf/dsn/ElphinstoneS13 fatcat:2uvav7y6h5djbipmlmgy7ip6jy

Towards a trust computing architecture for RPL in Cyber Physical Systems

Sebastian Seeber, Anuj Sehgal, Bjorn Stelte, Gabi Dreo Rodosek, Jurgen Schonwalder
2013 Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)  
This paper presents how it would be possible to use the security mechanisms of a TPM in order to secure the communication in an RPL network.  ...  Since complexity and size is a core concern in LLNs, off-loading the security features to a Trusted Platform Module (TPM) can make it possible to include sophisticated security provisions in an RPL implementation  ...  A conceptual overview of the TPM architecture is provided in Figure 1 . The cryptographic co-processor (C1) implements cryptographic operations within the TPM.  ... 
doi:10.1109/cnsm.2013.6727823 dblp:conf/cnsm/SeeberSSRS13 fatcat:w6s3b75zgzezxmxoxh6h5c3s6i

F6: Computer Systems Under Attack - Paying the Performance Price for Protection

2022 2022 IEEE International Solid- State Circuits Conference (ISSCC)  
The forum also includes post-quantum cryptographic algorithms and homomorphic encryption accelerators that promise very high security value propositions, while imposing orders-of-magnitude increase in  ...  design.  ...  He is a co-designer of 'Saber' which is a finalist in NIST's Post-Quantum Cryptography Standardization Project.  ... 
doi:10.1109/isscc42614.2022.9731690 fatcat:lws6fjt6yrg43i6uvteou33ty4

Hardware trust implications of 3-D integration

Ted Huffmire, Timothy Levin, Michael Bilzor, Cynthia E. Irvine, Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner
2010 Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10  
This paper examines the 3-D design approach and provides an analysis concluding that the commodity die system need not be independently trustworthy for the system of joined dies to provide certain trustworthy  ...  In addition to describing the range of possible security enhancements (such as cryptographic services), we describe the ways in which multiple-die subsystems can depend on each other, and a set of processing  ...  This research was funded in part by National Science Foundation Grant CNS-0910734.  ... 
doi:10.1145/1873548.1873549 dblp:conf/cases/HuffmireLBIVTSK10 fatcat:kl3tretz4fawzg2vbqpb7oozzy

simTPM: User-centric TPM for Mobile Devices (Technical Report) [article]

Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel
2019 arXiv   pre-print
We solve the technical challenge of implementing a TPM2.0 in the resource-constrained SIM card environment and integrate our simTPM into the secure boot chain of the ARM Trusted Firmware on a HiKey960  ...  In this paper, we present simTPM, an alternative implementation of a mobile TPM based on the SIM card available in mobile platforms.  ...  Asokan in "particular" for his insightful suggestions. We are also thankful to the anonymous reviewers for their valuable reviews.  ... 
arXiv:1905.08164v1 fatcat:tnabc6yxlzb3ni7pws55yg6hre

Hardware Platform Security for Mobile Devices

Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, Thomas Nyman
2022 Foundations and Trends® in Privacy and Security  
This became possible because over the last two decades, mobile phones evolved from closed platforms intended for voice calls and messaging to open platforms whose functionality can be extended in myriad  ...  The operational keys are generated in the cryptographic co-processor within the HSM and are then saved either in a keystore file or in application memory, encrypted under the master key of that co-processor  ...  The key management cryptographic engine (KMCE) is based on a 32-bit reduced instruction set computer (RISC) processor and includes a math co-processor designed for public key algorithm processing.  ... 
doi:10.1561/3300000024 fatcat:cw6shvbrvred3c5wyomwpympt4
« Previous Showing results 1 — 15 out of 1,301 results