Sciweavers

ERSA
2009

An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors

13 years 10 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring data integrity and confidentiality is of the utmost importance in many such applications. This paper describes a practical implementation of security extensions for embedded systems built around soft-core processors. These extensions guarantee the integrity and confidentiality of sensitive data residing in external memory and prevent various types of physical attacks on systems working in adverse conditions. We describe the programming model, security architecture, and give an initial analysis of performance and complexity overheads caused by the security extensions.
Austin Rogers, Aleksandar Milenkovic
Added 17 Feb 2011
Updated 17 Feb 2011
Type Journal
Year 2009
Where ERSA
Authors Austin Rogers, Aleksandar Milenkovic
Comments (0)