Special Section on Secure Computer Architectures

نویسندگان

  • Patrick Schaumont
  • Ruby Lee
  • Ronald Perez
  • Guido Bertoni
چکیده

COMPUTER architectures are profoundly affected by a new security landscape, caused by the dramatic evolution of information technology over the past decade. First, secure computer architectures have to support a wide range of security applications that extend well beyond the desktop environment, and that also include handheld, mobile, and embedded architectures, as well as high-end computing servers. Second, secure computer architectures have to support new applications of information security and privacy, as well as new information security standards. Third, secure computer architectures have to be protected and be tamperresistant at multiple abstraction levels, covering network, software, and hardware. This Special Section in Transactions on Computers aims to capture this evolving landscape of secure computing architectures, to build a vision of opportunities and unresolved challenges. Following an open call for papers, we received 30 submissions from authors in 18 different countries and on a broad range of topics related to secure computer architectures. After a preliminary screening, each submission was assigned to three reviewers. After the first round of reviews, we selected the six top-ranked papers for further consideration in the Special Section. These six papers were revised as a ‘minor revision’ by the authors. All six papers were eventually accepted into the Special Section. Among the remaining submissions, 11 papers were revised as a ‘major revision’ in the second round of reviews. These papers may eventually appear in a regular issue of IEEE Transactions on Computers, but they did notmeet the timeline or threshold for this Special Section. The first paper, “Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors,” by M. Fyrbiak et al., presents a technique to protect embedded software against code reverse-engineering. The paper also proposes statistical metrics to determine the quality of the protection. The second paper, “On Practical Discrete Gaussian Samplers For Lattice-Based Cryptography,” by J. Howe et al., proposes a comprehensive hardware evaluation of discrete Gaussian Samplers, a key building block for the next generation of lattice-based cryptography. The third paper, “Hardware/Software co-Design of an Accelerator for FV Homomorphic Encryption Scheme using Karatsuba Algorithm,” by V. Migliore et al., proposes a hardware-accelerated implementation the Somewhat Homomorphic Encryption (SHE) scheme, using fast polynomial arithmetic with the FFT algorithm. The fourth paper, “Bitstream Fault Injections (BiFI) Automated Fault Attacks against SRAM-based FPGAs,” by P. Swierczynski et al., demonstrates how the malicious modification of a bitstream can be used to mount an efficient fault attack on a cryptographic primitive integrated into an unknown FPGA bitstream. The fifth paper, “Hardware-Based Trusted Computing Architectures for Isolation and Attestation,” by P. Maene et al., makes a comprehensive analysis of recently proposed computer architectures and emphasizes on features used to enable isolation and attestation. The final paper, “GliFreD: Glitch-Free DuplicationTowards Power-Equalized Circuits on FPGAs,” by A. Moradi et al., proposes a dual-rail precharge implementation, suitable for mapping into a Field Programmable Gate Array, which supports the implementation of a hiding-based sidechannel countermeasure. Overall, the six papers of this Special Section capture the state of the art in physical and logical security of computer architectures. We are grateful to the submitting authors of all 30 submissions to this Special Section.We also sincerely thank the numerous anonymous reviewers who assisted with the selection of the papers for the Special Section. Finally, we are very grateful to the Editor in Chief and the staff of IEEE Transactions on Computers who enabled this Special Section and assisted uswith the practical implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing

Security is of paramount importance to the design of modern communication systems and in particular, to wireless networks. Wireless devices are becoming commonplace in both the office and home environment and therefore, the need for strong secure transport protocols is one of the most important issues in mobile standards. Cryptography is the foremost method for providing communication security ...

متن کامل

Virtualization Based Secure Execution and Testing Framework

Computer security aims at protecting confidentiality, integrity, and availability of sensitive information that are processed, used, or stored by computing systems. Computer scientists working in the field of computer security have successfully designed and developed software and hardware mechanisms to provide security in modern day computing devices. As compared to hardware security mechanisms...

متن کامل

Security Architectures Using Formal Methods Colin

A model describing secure communications architectures is developed using the formal language Z. The model is based on fundamental cryptographic properties. Some basic constraints are derived for the design of secure architectures which allow problems to the identified prior to design of security protocols. A simple criterion is derived for ensuring that all pairs of users can set up secure com...

متن کامل

A Routing-Aware Simulated Annealing-based Placement Method in Wireless Network on Chips

Wireless network on chip (WiNoC) is one of the promising on-chip interconnection networks for on-chip system architectures. In addition to wired links, these architectures also use wireless links. Using these wireless links makes packets reach destination nodes faster and with less power consumption. These wireless links are provided by wireless interfaces in wireless routers. The WiNoC archite...

متن کامل

On Social Network Web Sites: Definition, Features, Architectures and Analysis Tools

Development and usage of online social networking web sites are growing rapidly. Millions members of these web sites publicly articulate mutual "friendship" relations and share user-created contents, such as photos, videos, files, and blogs. The advances in web designing technology and fast growing usage of online resources prompted web designers to improve features and architectures of social ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Computers

دوره 67  شماره 

صفحات  -

تاریخ انتشار 2018