Virtualization
has well-known security advantages for operating systems and software,
but current techniques do not address increasingly important
hardware-security concerns. For widely deployed systems (e.g., Internet
of Things) and safety-critical systems (e.g., defense and automobiles),
protecting against device tampering is critical, but is often
unavoidable due to the relative ease of side-channel attacks. In this
letter, we present a novel usage of virtualization that limits damage
from bitstream tampering to a single instance of a deployed system by
employing unique virtual architectures (i.e., overlays) on
field-programmable gate arrays.
No comments:
Post a Comment