Development of a Programming Model for the AEGIS Secure Processor
نویسندگان
چکیده
In this thesis, a high level programming model for the AEGIS secure processor is designed and implemented. The AEGIS processor enables developers to create trusted systems, while only needing to trust the AEGIS processor. In order for developers to utilize the processor, there was a need for high level access to the low level AEGIS constructs. There was also a need for a practical programming model to describe how to correctly design and develop applications utilizing the AEGIS system. The implementation of this programming model was done using a combination of C, Java, and Assembly. Thesis Supervisor: Srinivas Devadas Title: Professor of Electrical Engineering and Computer Science
منابع مشابه
The aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملDesign and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
متن کامل
Modeling and scheduling no-idle hybrid flow shop problems
Although several papers have studied no-idle scheduling problems, they all focus on flow shops, assuming one processor at each working stage. But, companies commonly extend to hybrid flow shops by duplicating machines in parallel in stages. This paper considers the problem of scheduling no-idle hybrid flow shops. A mixed integer linear programming model is first developed to mathematically form...
متن کاملA Chance Constrained Multiple Objective Goal Programming Model of Fuzzy QFD and FMEA: Model Development
There are varieties of QFD combination forms available that can help management to choose the right model for his/her types of problem. The proposed MOCC-QFD-FMEA model is a right model to include variety of objectives as well as the risk factors into the model of the problem. Due to the fact that the model also takes into consideration the concept of Fuzzy set, it further allows management...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کامل