DocumentCode :
3818199
Title :
Transparent code authentication at the processor level
Author :
A.O. Durahim;E. Savas;B. Sunar;T.B. Pedersen;O. Kocabas
Author_Institution :
Sabanci University
Volume :
3
Issue :
4
fYear :
2009
fDate :
7/1/2009 12:00:00 AM
Firstpage :
354
Lastpage :
372
Abstract :
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system. The technique proposed tightly integrates the authentication mechanism into the processor core. The authentication latency is hidden behind the memory access latency, thereby allowing seamless on-the-fly authentication of instructions. In addition, the proposed authentication method supports seamless encryption of code (and static data). Consequently, while providing the software users with assurance for authenticity of programs executing on their hardware, the proposed technique also protects the software manufacturers´ intellectual property through encryption. The performance analysis shows that, under mild assumptions, the presented technique introduces negligible overhead for even moderate cache sizes.
Journal_Title :
IET Computers & Digital Techniques
Publisher :
iet
ISSN :
1751-8601
Type :
jour
DOI :
10.1049/iet-cdt.2007.0122
Filename :
5074334
Link To Document :
بازگشت