A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Implementing elliptic curve cryptography
Implementing elliptic curve cryptography
Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Smart Card Handbook
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Writing Secure Code
SPINS: security protocols for sensor networks
Wireless Networks
Subword Parallelism with MAX-2
IEEE Micro
Side Channel Cryptanalysis of Product Ciphers
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Cryptanalysis of the Revised NTRU Signature Scheme
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Secure Execution via Program Shepherding
Proceedings of the 11th USENIX Security Symposium
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
PROCOMET '98 Proceedings of the IFIP TC2/WG2.2,2.3 International Conference on Programming Concepts and Methods
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Towards a Completeness Result for Model Checking of Security Protocols
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Improving Computer Security Using Extended Static Checking
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Battery-Driven System Design: A New Frontier in Low Power Design
ASP-DAC '02 Proceedings of the 2002 Asia and South Pacific Design Automation Conference
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Tamper Resistance Mechanisms for Secure, Embedded Systems
VLSID '04 Proceedings of the 17th International Conference on VLSI Design
Biometrics and Network Security
Biometrics and Network Security
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Power-smart system-on-chip architecture for embedded cryptosystems
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Micro embedded monitoring for security in application specific instruction-set processors
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
From digital audiobook to secure digital multimedia-book
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
IMPRES: integrated monitoring for processor reliability and security
Proceedings of the 43rd annual Design Automation Conference
Multilevel Design Validation in a Secure Embedded System
IEEE Transactions on Computers
Autonomous and distributed node recovery in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Proceedings of the conference on Design, automation and test in Europe
Energy and execution time analysis of a software-based trusted platform module
Proceedings of the conference on Design, automation and test in Europe
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices
Wireless Personal Communications: An International Journal
Improving security for periodic tasks in embedded systems through scheduling
ACM Transactions on Embedded Computing Systems (TECS)
Ensuring secure program execution in multiprocessor embedded systems: a case study
CODES+ISSS '07 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis
Compact modular exponentiation accelerator for modern FPGA devices
Computers and Electrical Engineering
A linear programming formulation for security-aware gate sizing
Proceedings of the 18th ACM Great Lakes symposium on VLSI
An architecture to easily produce adventure and movie games for the mobile scenario
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
N-variant IC design: methodology and applications
Proceedings of the 45th annual Design Automation Conference
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Proceedings of the 45th annual Design Automation Conference
Digital audiobook: from passive to active pursuit
Multimedia Tools and Applications
Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Divided Backend Duplication Methodology for Balanced Dual Rail Routing
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
LOCS: a low overhead profiler-driven design flow for security of MPSoCs
CODES+ISSS '08 Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis
Analysis and design of a hardware/software trusted platform module for embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
Delay aware, reconfigurable security for embedded systems
Proceedings of the ICST 2nd international conference on Body area networks
CellTrust: a reputation model for C2C commerce
Electronic Commerce Research
Guest Editors’ Introduction to Security in Reconfigurable Systems Design
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Secure asynchronous communication for mobile devices
Proceedings of the Warm Up Workshop for ACM/IEEE ICSE 2010
Hardware-assisted run-time monitoring for secure program execution on embedded processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Threat of renovated .NET viruses to mobile devices
Proceedings of the 46th Annual Southeast Regional Conference on XX
Non-deterministic processors: FPGA-based analysis of area, performance and security
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
A secure digital camera architecture for integrated real-time digital rights management
Journal of Systems Architecture: the EUROMICRO Journal
FKM: a fingerprint-based key management protocol for SoC-based sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Buffer cache level encryption for embedded secure operating system
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
SeReCon: a secure reconfiguration controller for self-reconfigurable systems
International Journal of Critical Computer-Based Systems
Hierarchies of keys in secure multicast communications
Journal of Computer Security
Security analysis of India's electronic voting machines
Proceedings of the 17th ACM conference on Computer and communications security
Model-based security and dependability patterns in RCES: the TERESA approach
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
CUFFS: an instruction count based architectural framework for security of MPSoCs
Proceedings of the Conference on Design, Automation and Test in Europe
Side-channel analysis of cryptographic software via early-terminating multiplications
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A framework for defending embedded systems against software attacks
ACM Transactions on Embedded Computing Systems (TECS)
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
An exploration of mechanisms for dynamic cryptographic instruction set extension
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Enforcing S&D pattern design in RCES with modeling and formal approaches
Proceedings of the 14th international conference on Model driven engineering languages and systems
Embedded software security through key-based control flow obfuscation
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Energy Measurement and Analysis of Security Algorithms for Embedded Systems
GREENCOM '11 Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications
DynaPoMP: dynamic policy-driven memory protection for SPM-based embedded systems
WESS '11 Proceedings of the Workshop on Embedded Systems Security
Efficient scheme of verifying integrity of application binaries in embedded operating systems
The Journal of Supercomputing
Secure reconfiguration of software-defined radio
ACM Transactions on Embedded Computing Systems (TECS)
Evaluation metrics of physical non-invasive security
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Design of adaptive security mechanisms for real-time embedded systems
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
Mobile music distribution: a multichannel approach
Advances in Multimedia
POWER-MODES: POWer-EmulatoR- and MOdel-Based DEpendability and Security Evaluations
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Configuration-based approach to embedded device security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Security challenges in embedded systems
ACM Transactions on Embedded Computing Systems (TECS) - Special section on ESTIMedia'12, LCTES'11, rigorous embedded systems design, and multiprocessor system-on-chip for cyber-physical systems
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
Taxonomy for description of cross-domain attacks on CPS
Proceedings of the 2nd ACM international conference on High confidence networked systems
Optimization of secure embedded systems with dynamic task sets
Proceedings of the Conference on Design, Automation and Test in Europe
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
Journal of Parallel and Distributed Computing
An efficient protection scheme of digital contents under mobile devices
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors
Proceedings of the 21st International conference on Real-Time Networks and Systems
Light-weight primitive, feather-weight security: a cryptanalytic knock-out
Proceedings of the Workshop on Embedded Systems Security
Measurement-based research on cryptographic algorithms for embedded real-time systems
Journal of Systems Architecture: the EUROMICRO Journal
Secure embedded system hardware design - A flexible security and trust enhanced approach
Computers and Electrical Engineering
Hi-index | 0.00 |
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.