Cell broadband engine processor vault security architecture

被引:12
|
作者
Shimizu, K.
Hofstee, H. P.
Liberty, J. S.
机构
[1] IBM Syst & Technol Grp, Austin, TX 78758 USA
[2] IBM Syst & Technol Grp, STI Design Ctr, Austin, TX 78758 USA
关键词
D O I
10.1147/rd.515.0521
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current data protection technologies such as those based on public-key encryption and broadcast encryption focus on the secure control and protection of data. Although these protection schemes are effective and mathematically sound, they are susceptible to systematic attacks that utilize any underlying platforrn weakness, bypassing the cryptographic strengths of the actual schemes. Thus, ensuring that the computing platform supports the cryptographic data protection layers is a critical issue. The Cell Broadband Engine (TM) (Cell/B.E.) processor security architecture has three core features that are well suited for this purpose. It provides hardware-enforced process isolation in which code and data can execute in physically isolated memory space. It also provides the ability to perform hardware-supported authentication of any software stack (i.e., "secure boot") during runtime. Finally, the architecture provides a hardware key to act as the root of an encryption chain. Data encrypted directly or indirectly by this key can be decrypted and provided only to an application that is running in the isolated metnory and that has been verified. This significantly reduces an adversary's chances of manipulating software to evpose the key that is fundamental to a data protection or authentication scheme. Furthermore, it provides afioundation.for an application to attest itself to a remote party by demonstrating access to a secret.
引用
收藏
页码:521 / 528
页数:8
相关论文
共 50 条
  • [1] Cell broadband engine processor vault security architecture
    Shimizu, Kanna
    Hofstee, H. Peter
    Liberty, John S.
    IBM Journal of Research and Development, 2007, 51 (05): : 521 - 528
  • [2] A Security Review of the Cell Broadband Engine Processor
    Smith, Jessica
    He, Xiaohui
    Alves-Foss, Jim
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 4417 - 4424
  • [3] Verification of the Cell Broadband Engine™ processor
    Shimizu, Kanna
    Gupta, Sanjay
    Koyama, Tatsuya
    Omizo, Takashi
    Abdulhafiz, Jamee
    McConville, Larry
    Swanson, Todd
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 338 - +
  • [4] Cell broadband engine processor: Design and implementation
    Riley, M. W.
    Warnock, J. D.
    Wendel, D. F.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2007, 51 (05) : 545 - 557
  • [5] Cell broadband engine processor design methodology
    Takahashi, O.
    Behnen, E.
    Cottier, S. R.
    Coulman, P.
    Dhong, S. H.
    Flachs, B.
    Hofstee, P.
    Johnson, C. J.
    Posluszny, S.
    PROCEEDINGS OF THE IEEE 2007 CUSTOM INTEGRATED CIRCUITS CONFERENCE, 2007, : 711 - 716
  • [6] Accelerating computing with the cell broadband engine processor
    Crawford, Catherine
    Henning, Paul
    Kistler, Michael
    Wright, Cornell
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 353 - 353
  • [7] MapReduce for the Cell Broadband Engine Architecture
    de Kruijf, M.
    Sankaralingam, K.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (05)
  • [8] Introduction to the cell broadband engine architecture
    Johns, C. R.
    Brokenshire, D. A.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2007, 51 (05) : 503 - 519
  • [9] Performance Evaluation of Convolution on the Cell Broadband Engine Processor
    Ismail, Leila
    Guerchi, Driss
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (02) : 337 - 351
  • [10] Parallel exact inference on the Cell Broadband Engine processor
    Xia, Yinglong
    Prasanna, Viktor K.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2010, 70 (05) : 558 - 572