Building a high-performance, programmable secure coprocessor

SW Smith, S Weingart - Computer Networks, 1999 - Elsevier
SW Smith, S Weingart
Computer Networks, 1999Elsevier
Secure coprocessors enable secure distributed applications by providing safe havens
where an application program can execute (and accumulate state), free of observation and
interference by an adversary with direct physical access to the device. However, for these
coprocessors to be effective, participants in such applications must be able to verify that they
are interacting with an authentic program on an authentic, untampered device. Furthermore,
secure coprocessors that support general-purpose computation and will be manufactured …
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can execute (and accumulate state), free of observation and interference by an adversary with direct physical access to the device. However, for these coprocessors to be effective, participants in such applications must be able to verify that they are interacting with an authentic program on an authentic, untampered device. Furthermore, secure coprocessors that support general-purpose computation and will be manufactured and distributed as commercial products must provide these core sanctuary and authentication properties while also meeting many additional challenges, including: This paper summarizes the hardware, software, and cryptographic architecture we developed to address these problems. Furthermore, with our colleagues, we have implemented this solution, into a commercially available product.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果