首页> 外文会议>2019 56th ACM/IEEE Design Automation Conference >INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security
【24h】

INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security

机译:邀请:在我们信任的硬件中:硬件辅助安全性的收益和损失

获取原文
获取原文并翻译 | 示例

摘要

Data processing and communication in almost all electronic systems are based on Central Processing Units (CPUs). In order to guarantee confidentiality and integrity of the software running on a CPU, hardware-assisted security architectures are used. However, both the threat model and the non-functional platform requirements, i.e. performance and energy budget, differ when we go from high-end desktop computers and servers to low-end embedded devices that populate the internet of things (IoT). For high-end platforms, a relatively large energy budget is available to protect software against attacks. However, measures to optimize performance give rise to microarchitectural side-channel attacks. IoT devices, in contrast, are constrained in terms of energy consumption and do not incorporate the performance enhancements found in high-end CPUs. Hence, they are less likely to be susceptible to microarchitectural attacks, but give rise to physical attacks, exploiting, e.g., leakage in power consumption or through fault injection. Whereas previous work mostly concentrates on a specific architecture, this paper covers the whole spectrum of computing systems, comparing the corresponding hardware architectures, and most relevant threats.
机译:几乎所有电子系统中的数据处理和通信都基于中央处理器(CPU)。为了保证在CPU上运行的软件的机密性和完整性,使用了硬件辅助的安全体系结构。但是,当我们从高端台式计算机和服务器到填充物联网(IoT)的低端嵌入式设备时,威胁模型和非功能平台要求(即性能和能源预算)都不同。对于高端平台,可以使用相对较大的能源预算来保护软件免受攻击。但是,优化性能的措施引起了微体系结构侧通道攻击。相比之下,物联网设备在能耗方面受到限制,并且不包含高端CPU的性能增强。因此,它们不太可能受到微体系结构攻击,而是引起物理攻击,例如利用功耗泄漏或通过故障注入来进行攻击。尽管先前的工作主要集中在特定的体系结构上,但本文涵盖了计算系统的整个范围,比较了相应的硬件体系结构和最相关的威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号