Monday, November 6, 2017

Uniquified Virtualization Approach to Hardware Security

Virtualization has well-known security advantages for operating systems and software, but current techniques do not address increasingly important hardware-security concerns. For widely deployed systems (e.g., Internet of Things) and safety-critical systems (e.g., defense and automobiles), protecting against device tampering is critical, but is often unavoidable due to the relative ease of side-channel attacks. In this letter, we present a novel usage of virtualization that limits damage from bitstream tampering to a single instance of a deployed system by employing unique virtual architectures (i.e., overlays) on field-programmable gate arrays.

 

VLSI IEEE Projects Titles 2017 2018  

9790675343

contact@codeshoppy.com

No comments:

Post a Comment