Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
- 28 July 2005
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 32nd International Symposium on Computer Architecture (ISCA'05)
Abstract
Secure processors enable new applications by ensuring private and authentic program execution even in the face of physical attack. In this paper, we present the AEGIS secure processor architecture, and evaluate its RTL implementation on FPGAs. By using physical random functions, we propose a new way of reliably protecting and sharing secrets that is more secure than existing solutions based on non-volatile memory. Our architecture gives applications the flexibility of trusting and protecting only a portion of a given process, unlike prior proposals which require a process to be protected in entirety. We also put forward a specific model of how secure applications can be programmed in a high-level language and compiled to run on our system. Finally, we evaluate a fully functional FPGA implementation of our processor, assess the implementation tradeoffs, compare performance, and demonstrate the benefits of partially protecting a program.Keywords
This publication has 12 references indexed in Scilit:
- Towards the issues in architectural support for protection of software executionACM SIGARCH Computer Architecture News, 2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- HIDEPublished by Association for Computing Machinery (ACM) ,2004
- Efficient memory integrity verification and encryption for secure processorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Fast secure processor for inhibiting software piracy and tamperingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- AEGISPublished by Association for Computing Machinery (ACM) ,2003
- A noise-based IC random number generator for applications in cryptographyIEEE Transactions on Circuits and Systems I: Regular Papers, 2000
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996