Register-Bank Trojan Isolation in Embedded Microprocessors Through Secure Programming
سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 451
فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
NPECE01_357
تاریخ نمایه سازی: 6 بهمن 1395
چکیده مقاله:
Microprocessors are core to almost every embedded electronic device; along with wide range of applications from consumer electronics to medical equipment, transportation, etc. Thanks to technological advances the microprocessors are ever increasingly becoming more complex and powerful. The design flow of microprocessors involves various contributing individuals and parties; which might be dispersed around the globe. The scattered nature of design flow poses the threat of adversary individuals and parties inserting malicious hardware in the design; and consequently modifying the original functionalities in an unintended manner. Given the crucial role of microprocessors in the system any vulnerability to potential hardware trojans can be detrimental in case deployed in critical infrastructures like clinical and healthcare monitoring systems, navigation and avionics systems, etc. This study attempts to minimize the risk posed by hardware trojans through isolation of suspicious registers in the registerbankso that the integrity of software running on such microprocessors in not negatively affected.
کلیدواژه ها:
نویسندگان
Peyman Talebian
Department of Computer Science and Engineering, Shahid Beheshti University, G.C., Tehran, Iran
Ali Jahanian
Department of Computer Science and Engineering, Shahid Beheshti University, G.C., Tehran, Iran