An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
IMPRES: integrated monitoring for processor reliability and security
Proceedings of the 43rd annual Design Automation Conference
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Turtles all the way down: research challenges in user-based attestation
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Embedded Trusted Computing with Authenticated Non-volatile Memory
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
The role of virtualization in embedded systems
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Hardware Support for Secure Processing in Embedded Systems
IEEE Transactions on Computers
Trust Ensuring Crisis Management Hardware Module
Information Security Journal: A Global Perspective
An Evaluation of Microkernel-Based Virtualization for Embedded Real-Time Systems
ECRTS '10 Proceedings of the 2010 22nd Euromicro Conference on Real-Time Systems
Security engineering for embedded systems: the SecFutur vision
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
Stuxnet: Dissecting a Cyberwarfare Weapon
IEEE Security and Privacy
Efficient CRT RSA with SCA Countermeasures
DSD '11 Proceedings of the 2011 14th Euromicro Conference on Digital System Design
A comparative study of hardware architectures for lightweight block ciphers
Computers and Electrical Engineering
The embedded systems design challenge
FM'06 Proceedings of the 14th international conference on Formal Methods
Protecting CRT RSA against Fault and Power Side Channel Attacks
ISVLSI '12 Proceedings of the 2012 IEEE Computer Society Annual Symposium on VLSI
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0
Microprocessors & Microsystems
Hi-index | 0.00 |
Embedded systems have found a very strong foothold in global Information Technology (IT) market since they can provide very specialized and intricate functionality to a wide range of products. On the other hand, the migration of IT functionality to a plethora of new smart devices (like mobile phones, cars, aviation, game or households machines) has enabled the collection of a considerable number of data that can be characterized sensitive. Therefore, there is a need for protecting that data through IT security means. However, eare usually dployed in hostile environments where they can be easily subject of physical attacks. In this paper, we provide an overview from ES hardware perspective of methods and mechanisms for providing strong security and trust. The various categories of physical attacks on security related embedded systems are presented along with countermeasures to thwart them and the importance of reconfigurable logic flexibility, adaptability and scalability along with trust protection mechanisms is highlighted. We adopt those mechanisms in order to propose a FPGA based embedded system hardware architecture capable of providing security and trust along with physical attack protection using trust zone separation. The benefits of such approach are discussed and a subsystem of the proposed architecture is implemented in FPGA technology as a proof of concept case study. From the performed analysis and implementation, it is concluded that flexibility, security and trust are fully realistic options for embedded system security enhancement.