Title :
Extended abstract: Trustworthy system security through 3-D integrated hardware
Author :
Huffmire, Ted ; Valamehr, Jonathan ; Sherwood, Timothy ; Kastner, Ryan ; Levin, Timothy ; Nguyen, Thuy D. ; Irvine, Cynthia
Author_Institution :
Dept. of Comput. Sci., Naval Postgrad. Sch., Monterey, CA
Abstract :
While hardware resources in the form of both transistors and full microprocessor cores are now abundant, economic factors prevent specialized hardware mechanisms required for secure processing from being integrated into commodity parts. We are exploring a novel way in which commodity hardware can be augmented after fabrication to enhance secure operation for only those systems that require it. Our methods will be applicable to a wide range of security problems, including the detection and isolation of hardware subversion and Trojan horses, cache-based side channels in chip multi-processors (CMPs), embedded systems security, and hardware intrusion detection and prevention.
Keywords :
security of data; 3D integrated hardware; Trojan horses; cache-based side channels; chip multi-processors; embedded systems security; hardware intrusion detection; hardware intrusion prevention; hardware subversion; secure processing; trustworthy system security; Circuits; Computer science; Computer security; Costs; Economics; Fabrication; Hardware; Invasive software; Manufacturing; Microprocessors;
Conference_Titel :
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4244-2401-6
DOI :
10.1109/HST.2008.4559061