Design of the Secure Execution PUF-based Processor (SEPP)
FakultätenFakultät für Ingenieurwissenschaften und Informatik
LizenzCC BY-SA 3.0 Deutschland
A persistent problem with program execution is its vulnerability to code injection attacks. Equally unsolved is the susceptibility of software to reverse engineering, which undermines code confidentiality. We propose an approach that solves both kinds of security problems by employing instruction-level code encryption combined with the use of a physical unclonable function (PUF). Our Secure Execution PUF-based Processor (SEPP) architecture is designed to minimize the attack surface, as well as the performance impact, and requires no significant changes to the software development process. Our approach supports distributed systems, as the secure execution environment needs not be physically available to the developer.
Erstellung / Fertigstellung
OriginalpublikationWorkshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2015
Normierte SchlagwörterAnwendungsspezifischer Prozessor [GND]
Field programmable gate arrays; Security measures [LCSH]