Trustworthy Reconfigurable Systems: Enhancing the Security by Thomas Feller

By Thomas Feller

​Thomas Feller sheds a few gentle on belief anchor architectures for reliable reconfigurable structures. he's proposing novel suggestions improving the safety services of reconfigurable undefined. virtually invisible to the consumer, many desktops are embedded into daily artifacts, reminiscent of automobiles, ATMs, and pacemakers. the numerous development of this marketplace section in the fresh years enforced a rethinking with admire to the safety homes and the trustworthiness of those structures. The trustworthiness of a approach generally equates to the integrity of its method elements. Hardware-based belief anchors offer measures to check the approach configuration to reference measurements. Reconfigurable architectures signify a distinct case during this regard, as as well as the software program implementation, the underlying structure can be exchanged, even in the course of runtime.

Show description

Read Online or Download Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures PDF

Best information theory books

Theory of Information: Fundamentality, Diversity and Unification (World Scientific Series in Information Studies)

This designated quantity offers a brand new technique - the overall concept of data - to clinical figuring out of knowledge phenomena. in response to a radical research of knowledge strategies in nature, expertise, and society, in addition to at the major instructions in info concept, this concept synthesizes current instructions right into a unified method.

Managing Economies, Trade and International Business

The present section of globalization and the elevated interconnectedness of economies via exchange have encouraged the administration and development charges of economies and in addition the aggressive and managerial concerns for companies. This ebook makes a speciality of 3 major matters – fiscal progress and sustainable improvement; alternate, legislation and rules; and aggressive and managerial matters in overseas enterprise – from a multidisciplinary, transversal and eclectic viewpoint.

Efficient Secure Two-Party Protocols: Techniques and Constructions

The authors current a complete learn of effective protocols and strategies for safe two-party computation – either basic structures that may be used to soundly compute any performance, and protocols for particular difficulties of curiosity. The ebook specializes in thoughts for developing effective protocols and proving them safe.

Information Theory and Best Practices in the IT Industry

​​​The significance of benchmarking within the provider area is easily well-known because it is helping in non-stop development in items and paintings methods. via benchmarking, businesses have strived to enforce top practices to be able to stay aggressive within the product- industry within which they function. in spite of the fact that stories on benchmarking, rather within the software program improvement region, have ignored utilizing a number of variables and for that reason haven't been as complete.

Additional resources for Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures

Sample text

Protected capabilities refers to the shielded execution environment and a protected cryptographic key storage. Integrity measurement refers to the process of cryptographically hashing the executed programs before execution. Whereas system integrity reporting is referring to the process of attesting the system state to an external requester. The TPM is in principle a coprocessor realizing cryptographic services, similar to the services provided by SmartCards. Some manufacturers even share the security controller architecture between SmartCards and TPMs.

Whenever a PCR is updated, a new entry to the SML is created to reflect the inputs and their temporal sequence. The five localities in PCR17 to PCR21 define special usage for PCRs to allow various trusted processes to communicate with the TPM. Using these localities, the TPM is aware of which process is sending commands. The locality 4 is usually utilized to authenticate the processor and to enable the dynamic Root-of-Trust execution (cf. 1). Hence, the representation of a particular process may remain unchanged, even if other parts of the configuration have been modified.

The CRTM represents the fundamental component for integrity measurements. The RTS and RTR are both implemented in the TPM itself and guarded by the Storage Root Key (SRK) and the Endorsment Key (EK), respectively. Securely storing the data being processed by the TPM is the purpose of the RTS. Reporting the system integrity information to an external requester is provided by the RTR (cf. 7). 2. It additionally details series of necessary commands for initialization to reach the operational state after a reboot.

Download PDF sample

Rated 4.77 of 5 – based on 27 votes