An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
نویسندگان
چکیده
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring data integrity and confidentiality is of the utmost importance in many such applications. This paper describes a practical implementation of security extensions for embedded systems built around soft-core processors. These extensions guarantee the integrity and confidentiality of sensitive data residing in external memory and prevent various types of physical attacks on systems working in adverse conditions. We describe the programming model, security architecture, and give an initial analysis of performance and complexity overheads caused by the security extensions.
منابع مشابه
Security extensions for integrity and confidentiality in embedded processors
With current trends toward embedded computer systems’ ubiquitous accessibility, connectivity, diversification, and proliferation, security becomes a critical issue in embedded computer systems design and operation. Embedded computer systems are subjected to both software and physical attacks aimed at subverting system operation, extracting key secrets, or intellectual property theft. We propose...
متن کاملLow latency Solution for Confidentiality and Integrity Checking in Embedded Systems with Off-Chip Memory
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip memory. Our security core is based on one-time pad (OTP) encryption and a CRC integrity check module. These modules safeguard external memories for embedded processors against a series of well-known attacks, including replay attacks, spoofing attacks and relocation attacks. The implementation limi...
متن کاملارزیابی الزامات امنیت و محرمانگی اطلاعات در پیاده سازی سیستم پرونده پزشکی الکترونیک در بیمارستان های شهر اصفهان سال 1393
Background and purpose: Today, with the advent of electronic medical record system (EMRS) the security and confidentiality of information ought to be reasonably considered. The purpose of this study was to assess the privacy and security requirements for implementation of EMRS in all hospitals in Isfahan in 2014. Materials and methods: An analysis framework was used in an applied study perform...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کامل