2018
DOI: 10.1051/matecconf/201821002047
|View full text |Cite
|
Sign up to set email alerts
|

Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic

Abstract: Embedded systems are subjecting to various kinds of security threats. Some malicious attacks exploit valid code gadgets to launch destructive actions or to reveal critical details. Some previous memory encryption strategies aiming at this issue suffer from unacceptable performance overhead and resource consumption. This paper proposes a hardware based confidentiality protection method to secure the code and data stored and transferred in embedded systems. This method takes advantage of the I/D-cache structure … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The AES engine consumes extra hardware resources when multiple external memory devices are present in the system [ 30 ]. Wang proposed a scheme for encrypting code and storing data using the AES [ 31 ]. However, encryption with fixed-key introduces security risks such as key leakage.…”
Section: Related Workmentioning
confidence: 99%
“…The AES engine consumes extra hardware resources when multiple external memory devices are present in the system [ 30 ]. Wang proposed a scheme for encrypting code and storing data using the AES [ 31 ]. However, encryption with fixed-key introduces security risks such as key leakage.…”
Section: Related Workmentioning
confidence: 99%
“…There are two ways to encrypt system data by using AES. One is the block encryption method [29], in which the content of the data block is used as the input of the encryption algorithm and the output is the cipher of the data block. The other is OTP based stream encryption, that is, the AES algorithm is used as a key stream generator to generate a series of random numbers, and the data can be encrypted and decrypted by performing the XOR operation with the sequence.…”
Section: Data Confidentiality Protectionmentioning
confidence: 99%