SHIELDSTRAP: Making Secure Processors Truly Secure

被引:6
作者
Chhabra, Siddhartha [1 ]
Rogers, Brian [1 ]
Solihin, Yan [1 ]
机构
[1] N Carolina State Univ, Raleigh, NC 27695 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN | 2009年
关键词
D O I
10.1109/ICCD.2009.5413140
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread and feasible. Many of these attacks target a system during booting before any employed security measures can take effect. In this paper, we propose SHIELDSTRAP, a security architecture capable of booting a system securely in the face of hardware and software attacks targeting the boot phase. SHIELDSTRAP bridges the gap between the vulnerable initialization of the system and the secure steady state execution environment provided by the secure processor. We present an analysis of the security of SHIELDSTRAP against several common boot time attacks. We also show that SHIELDSTRAP requires an on-chip area overhead of only 0.012% and incurs negligible boot time overhead of 0.37 seconds.
引用
收藏
页码:289 / 296
页数:8
相关论文
共 35 条
[1]  
[Anonymous], P 9 INT C ARCH SUPP
[2]  
[Anonymous], 1997, HMAC KEYED HASHING M, DOI DOI 10.17487/RFC2104
[3]  
Arbaugh W. A., 1997, P 1997 IEEE S SEC PR
[4]  
ARM, 2004, ARM TrustZone
[5]  
Brickell E. F., 2004, ACM C COMP COMM SEC
[6]   ON DERIVATIVE ESTIMATION OF SINGLE-SERVER QUEUES VIA STRUCTURAL INFINITESIMAL PERTURBATION ANALYSIS [J].
DAI, LY ;
HO, YC .
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 1995, 5 (01) :5-32
[7]  
*FIPS, 1995, FIPS PUBL, V1801
[8]  
*FIPS, 1994, FIPS PUBL, V186
[9]  
*FIPS, 1993, FIPS PUBL, V197
[10]  
GASSEND B., 2003, P 9 INT S HIGH PERF