首页> 外文会议>ACM/IEEE Design Automation Conference >INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security
【24h】

INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security

机译:邀请:在硬件中,我们信任:硬件辅助安全性的收益和痛苦

获取原文

摘要

Data processing and communication in almost all electronic systems are based on Central Processing Units (CPUs). In order to guarantee confidentiality and integrity of the software running on a CPU, hardware-assisted security architectures are used. However, both the threat model and the non-functional platform requirements, i.e. performance and energy budget, differ when we go from high-end desktop computers and servers to low-end embedded devices that populate the internet of things (IoT). For high-end platforms, a relatively large energy budget is available to protect software against attacks. However, measures to optimize performance give rise to microarchitectural side-channel attacks. IoT devices, in contrast, are constrained in terms of energy consumption and do not incorporate the performance enhancements found in high-end CPUs. Hence, they are less likely to be susceptible to microarchitectural attacks, but give rise to physical attacks, exploiting, e.g., leakage in power consumption or through fault injection. Whereas previous work mostly concentrates on a specific architecture, this paper covers the whole spectrum of computing systems, comparing the corresponding hardware architectures, and most relevant threats.
机译:几乎所有电子系统中的数据处理和通信都基于中央处理单元(CPU)。为了保证在CPU上运行的软件的机密性和完整性,使用硬件辅助安全体系结构。然而,威胁模型和非功能性平台要求,即性能和能源预算,当我们从高端台式计算机和服务器到填充物联网(IOT)的低端嵌入式设备时,差异化和能源预算。对于高端平台,可以使用相对较大的能量预算来保护软件免受攻击。但是,优化性能的措施产生了微体系结构侧通道攻击。相反,IOT设备在能量​​消耗方面受到约束,并且不包含高端CPU中发现的性能增强功能。因此,它们不太可能易于微型建筑攻击,但引起物理攻击,利用,例如,电力消耗泄漏或通过故障注射。虽然以前的工作主要集中在特定的架构上,但本文介绍了整个计算系统的整个频谱,比较了相应的硬件架构以及大多数相关威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号