22nd Digital Avionics Systems Conference. Proceedings (Cat. No.03CH37449)
DOI: 10.1109/micro.2003.1253209
|View full text |Cite
|
Sign up to set email alerts
|

Fast secure processor for inhibiting software piracy and tampering

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(4 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…In [51], the authors predict encryption counters for speculative OTP pre-computation. In [58,59], encryption counters are cached which can also further reduce our overheads.…”
Section: Secure Hardwarementioning
confidence: 99%
“…In [51], the authors predict encryption counters for speculative OTP pre-computation. In [58,59], encryption counters are cached which can also further reduce our overheads.…”
Section: Secure Hardwarementioning
confidence: 99%
“…In the article by Yang et al (2003), the researchers present a technique in which the cryptography computation is shifted off from the memory access critical path by using a different encryption scheme, namely "one-time pad" encryption, to produce the instructions and data cipher-text. However, overall performance in multi-task systems and context switching is not well addressed.…”
Section: Related Workmentioning
confidence: 99%
“…Many Yang et al, 2003) emphasize on memory encryption and authentication by efficient hardware approaches in single-core systems. Our proposed scheme focuses on on-chip secret protection in multi-core processors.…”
Section: Related Workmentioning
confidence: 99%
“…Pure soft-ware solutions itself cannot counter all attacks, therefore, enforcing security in processor design has drawn more and more attention. Currently many proposed works focus on encryption and authentication of hardware memory in singlecore systems (Gassend, Suh, Clarke, Dijk, & Devadas, 2003;Lee, Kwan, McGregor, Dwoskin, & Wang, 2005;Shi, Lee, Ghosh, Lu, & Boldyreva, 2005; Yan, Rogers, Englender, Solihin, & Prvulovic, 2006; Yang, Zhang, & Gao, 2003). They usually assume the processor core as a safe and secure unit.…”
Section: Introductionmentioning
confidence: 99%