IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking
نویسندگان
چکیده
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. In this paper we devise a code compression method, the IBC-EI (Instruction Based Compression with Encryption and Integrity checking), tailored to provide integrity checking and encryption to secure processor-memory transaction. The principle is to keep the ciphered code compressed in the memory, thus reducing the memory footprint and providing more information per memory access. The results for the Leon Processor and a set of Mediabench and MiBench benchmarks show that the overhead introduced by the code encryption and integrity checking scheme is almost completely eliminated by the compression mechanism.
منابع مشابه
FRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
متن کاملHCIC: Hardware-assisted Control-flow Integrity Checking
Recently, code reuse attacks (CRAs), such as returnoriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threatens. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardwarebased, have been proposed. However, softwa...
متن کاملSCAN Cryptoprocessor
This paper presents a detailed architecture and instruction set of the SCAN cryptoprocessor. The SCAN cryptoprocessor is a modified SparcV8 processor architecture with a new instruction set to handle image compression, encryption, and information hiding based on the SCAN methodology. The modules for image compression, encryption, and information hiding are synthesized in reconfigurable logic an...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملPublic Auditing for Regeneration Code Based Cloud Storage Using Homomorphic Encryption for User Privacy
To protect the outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Existing remote checking methods for regenerating-coded data only provide public auditing with the help of Third Party Auditor (TPA) and Proxy to manage and recover the data if lost, but there is a lack of use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007