2011 International Symposium on Electronic System Design 2011
DOI: 10.1109/ised.2011.34
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Memory Authentication Mechanism in Embedded Systems

Abstract: The pervasiveness of modern day embedded systems has led to the storing of huge amount of sensitive information in them. These embedded devices have to often operate under insecure environments and hence are susceptible to software and physical attacks. Hence security becomes a prime concern in embedded systems. Although a lot of hardware cryptographic techniques have been proposed to provide high levels of security, they are hampered by the trade-offs created by the energy constraints in embedded systems. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…For data integrity protection, many work presented new schemes for uniprocessor [3][4] [5] and Multi-processors platform [6] [7] [8] . This paper focused on the integrity protection scheme of uniprocessor.…”
Section: Introductionmentioning
confidence: 99%
“…For data integrity protection, many work presented new schemes for uniprocessor [3][4] [5] and Multi-processors platform [6] [7] [8] . This paper focused on the integrity protection scheme of uniprocessor.…”
Section: Introductionmentioning
confidence: 99%
“…Hardware security, on the contrary, includes Secure Processor Architectures such as ABYSS [4], AEGIS [5], Arc3D [6,7], Hide [8] and XOM [9] assume only the processor chip as secure and all off-chip devices as untrustworthy. These architectures deploy hardware mechanisms like memory encryption to provide confidentiality and memory authentication [10] to ensure the integrity of the applications. Memory encryption encrypts the data before writ-ing and decrypts it after reading from the off-chip memory.…”
Section: Introductionmentioning
confidence: 99%
“…Existing tree techniques include HASH trees, Parallelizable authentication (PAT) trees, and Temper evident counter (TEC)-tree [7]. However, implementing such integrity trees significantly increases runtime and memory overhead [37,73], making them infeasible for embedded systems with tight energy constraints. Therefore, runtime integrity checking has been identified as one of the leading open issues for trusted computing in mobile devices [39].…”
Section: Memory Authentication Schemesmentioning
confidence: 99%