Sciweavers

Share
MICRO
2006
IEEE

Authentication Control Point and Its Implications For Secure Processor Design

11 years 15 days ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing, secure mobile agents by providing a secure computing environment that is resistant to both physical tampering and software exploits. Two essential features offered by a secure processor are software encryption for protecting software privacy and integrity verification for preventing tampering of the protected software. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood. This paper aims to remedy this research deficiency by evaluating different designs that integrate software decryption and integrity verification into an out-oforder pipeline. Our paper provides an in-depth analysis of the security and performance trade-offs, implications of sever...
Weidong Shi, Hsien-Hsin S. Lee
Added 12 Jun 2010
Updated 12 Jun 2010
Type Conference
Year 2006
Where MICRO
Authors Weidong Shi, Hsien-Hsin S. Lee
Comments (0)
books