Sciweavers

Share
MICRO
2006
IEEE

Authentication Control Point and Its Implications For Secure Processor Design

12 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing, secure mobile agents by providing a secure computing environment that is resistant to both physical tampering and software exploits. Two essential features offered by a secure processor are software encryption for protecting software privacy and integrity verification for preventing tampering of the protected software. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood. This paper aims to remedy this research deficiency by evaluating different designs that integrate software decryption and integrity verification into an out-oforder pipeline. Our paper provides an in-depth analysis of the security and performance trade-offs, implications of sever...
Weidong Shi, Hsien-Hsin S. Lee
Added 12 Jun 2010
Updated 12 Jun 2010
Type Conference
Year 2006
Where MICRO
Authors Weidong Shi, Hsien-Hsin S. Lee
Comments (0)
books