Show simple item record

AuthorUnterstein, Floriandc.contributor.author
AuthorKleber, Stephandc.contributor.author
AuthorMatousek, Matthiasdc.contributor.author
AuthorKargl, Frankdc.contributor.author
AuthorSlomka, Frankdc.contributor.author
AuthorHiller, Matthiasdc.contributor.author
Date of accession2016-03-15T10:40:10Zdc.date.accessioned
Available in OPARU since2016-03-15T10:40:10Zdc.date.available
Year of creation2015dc.date.created
AbstractA persistent problem with program execution is its vulnerability to code injection attacks. Equally unsolved is the susceptibility of software to reverse engineering, which undermines code confidentiality. We propose an approach that solves both kinds of security problems by employing instruction-level code encryption combined with the use of a physical unclonable function (PUF). Our Secure Execution PUF-based Processor (SEPP) architecture is designed to minimize the attack surface, as well as the performance impact, and requires no significant changes to the software development process. Our approach supports distributed systems, as the secure execution environment needs not be physically available to the developer.dc.description.abstract
Languageendc.language.iso
PublisherUniversität Ulmdc.publisher
LicenseCC BY-SA 3.0 Deutschlanddc.rights
Link to license texthttp://creativecommons.org/licenses/by-sa/3.0/de/dc.rights.uri
KeywordFPGA implementationdc.subject
KeywordPhysically unclonable functions (PUF)dc.subject
KeywordProcessordc.subject
KeywordSecure execution environmentdc.subject
Dewey Decimal GroupDDC 004 / Data processing & computer sciencedc.subject.ddc
LCSHField programmable gate arrays; Security measuresdc.subject.lcsh
TitleDesign of the Secure Execution PUF-based Processor (SEPP)dc.title
Resource typeKonferenzbanddc.type
DOIhttp://dx.doi.org/10.18725/OPARU-3255dc.identifier.doi
PPN1653540915dc.identifier.ppn
URNhttp://nbn-resolving.de/urn:nbn:de:bsz:289-vts-98558dc.identifier.urn
GNDAnwendungsspezifischer Prozessordc.subject.gnd
FacultyFakultät für Ingenieurwissenschaften und Informatikuulm.affiliationGeneral
Citation of original publ.Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2015uulm.citationOrigPub
Date of activation2015-12-17T16:56:34Zuulm.freischaltungVTS
Peer reviewneinuulm.peerReview
DCMI TypeTextuulm.typeDCMI
VTS-ID9855uulm.vtsID
CategoryPublikationenuulm.category
Conference nameWorkshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2015uulm.conferenceName
Conference placeSaint Malouulm.conferencePlace
Conference start date2015-09-17uulm.conferenceStartDate
University Bibliographyjauulm.unibibliographie


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-SA 3.0 Deutschland
Except where otherwise noted, this item's license is described as CC BY-SA 3.0 Deutschland