메뉴 건너뛰기




Volumn 54, Issue 11, 2008, Pages 1065-1076

Secure communication in microcomputer bus systems for embedded devices

Author keywords

AMBA bus; Embedded security; Lightweight cryptography; Secure bus systems; Tree Parity Machines

Indexed keywords

BUSES; COMPUTER CRIME; COMPUTERS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; HARDWARE; INTERFACES (COMPUTER); INTERNET PROTOCOLS; NETWORK ARCHITECTURE; PERSONAL COMPUTING;

EID: 52949102546     PISSN: 13837621     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sysarc.2008.04.003     Document Type: Article
Times cited : (23)

References (38)
  • 1
    • 3242756924 scopus 로고    scopus 로고
    • Embedded system security
    • Koopman P. Embedded system security. IEEE Comp. 37 7 (2004) 95-97
    • (2004) IEEE Comp. , vol.37 , Issue.7 , pp. 95-97
    • Koopman, P.1
  • 2
    • 47749138473 scopus 로고    scopus 로고
    • R. Anderson, Protecting embedded systems - the next ten years, in: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, CHES, vol. 2162 of LNCS, Paris, Springer, 2001.
    • R. Anderson, Protecting embedded systems - the next ten years, in: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, CHES, vol. 2162 of LNCS, Paris, Springer, 2001.
  • 3
    • 4444331720 scopus 로고    scopus 로고
    • S. Ravi, P. Kocher, R.B. Lee, G. McGraw, A. Raghunathan, Security as a new dimension in embedded system design, DAC 2004, pp. 753-760.
    • S. Ravi, P. Kocher, R.B. Lee, G. McGraw, A. Raghunathan, Security as a new dimension in embedded system design, DAC 2004, pp. 753-760.
  • 4
    • 52949121509 scopus 로고    scopus 로고
    • ARM, AMBA Specification (Rev 2.0). .
    • ARM, AMBA Specification (Rev 2.0). .
  • 5
    • 52949134925 scopus 로고    scopus 로고
    • IBM, CoreConnect Bus Architecture. .
    • IBM, CoreConnect Bus Architecture. .
  • 6
    • 52949086163 scopus 로고    scopus 로고
    • Opencores, WISHBONE Bus (Rev B.3). .
    • Opencores, WISHBONE Bus (Rev B.3). .
  • 8
    • 52949140675 scopus 로고    scopus 로고
    • R.J. Anderson, M.G. Kuhn, Low cost attacks on tamper resistant devices, in: M. Lomas et al. (Eds.), Security Protocols, Proceedings of the Fifth International Workshop, Paris, France, April 7-9, LNCS 1361, Springer, 1997, pp. 125-136.
    • R.J. Anderson, M.G. Kuhn, Low cost attacks on tamper resistant devices, in: M. Lomas et al. (Eds.), Security Protocols, Proceedings of the Fifth International Workshop, Paris, France, April 7-9, LNCS 1361, Springer, 1997, pp. 125-136.
  • 9
    • 0032180824 scopus 로고    scopus 로고
    • Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
    • Kuhn M.G. Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP. IEEE Trans. Comput. 47 10 (1998) 1153-1157
    • (1998) IEEE Trans. Comput. , vol.47 , Issue.10 , pp. 1153-1157
    • Kuhn, M.G.1
  • 10
    • 33745897337 scopus 로고    scopus 로고
    • J. Grand, Research lessons from hardware hacking, Commun. ACM 49 (6) (2006) 44-49.
    • J. Grand, Research lessons from hardware hacking, Commun. ACM 49 (6) (2006) 44-49.
  • 11
    • 52949150514 scopus 로고    scopus 로고
    • R.M. Best, Crypto microprocessor that executes enciphered programs, US Patent 4,465,901 (1984).
    • R.M. Best, Crypto microprocessor that executes enciphered programs, US Patent 4,465,901 (1984).
  • 12
    • 52949130342 scopus 로고    scopus 로고
    • R. Takahashi, D.N. Heer, Secure memory management unit for microprocessor, US Patent 5,825,878 (1998).
    • R. Takahashi, D.N. Heer, Secure memory management unit for microprocessor, US Patent 5,825,878 (1998).
  • 13
    • 52949112358 scopus 로고    scopus 로고
    • B. Candelore, E. Sprunk, Secure processor with external memory using block chaining and block reordering, US Patent 6,061,449 (2000).
    • B. Candelore, E. Sprunk, Secure processor with external memory using block chaining and block reordering, US Patent 6,061,449 (2000).
  • 14
    • 84889019266 scopus 로고    scopus 로고
    • T. Gilmont, J.-D. Legat, J.-J. Quisquater, Enhancing the security in the memory management unit, in: Proceedings of the 25th EuroMicro Conference, 1999, pp. 449-456.
    • T. Gilmont, J.-D. Legat, J.-J. Quisquater, Enhancing the security in the memory management unit, in: Proceedings of the 25th EuroMicro Conference, 1999, pp. 449-456.
  • 15
    • 1142280988 scopus 로고    scopus 로고
    • G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, S. Devadas, The AEGIS processor architecture for tamper-evident and tamper-resistant processing, in: Proceedings of the 17th International Conference on Supercomputing (ICS'03), June 23-26, 2003.
    • G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, S. Devadas, The AEGIS processor architecture for tamper-evident and tamper-resistant processing, in: Proceedings of the 17th International Conference on Supercomputing (ICS'03), June 23-26, 2003.
  • 16
    • 33646909103 scopus 로고    scopus 로고
    • R. Elbaz, L. Torres, G. Sassatelli, P. Guillemin, C. Anguille, M. Bardouillet, C. Buatois, J. B, Rigaud, Hardware engines for bus encryption: a survey of existing techniques, in: Proceedings of the Design Automation and Test in Europe (Date'05), 2005, pp. 40-45.
    • R. Elbaz, L. Torres, G. Sassatelli, P. Guillemin, C. Anguille, M. Bardouillet, C. Buatois, J. B, Rigaud, Hardware engines for bus encryption: a survey of existing techniques, in: Proceedings of the Design Automation and Test in Europe (Date'05), 2005, pp. 40-45.
  • 17
    • 52949124152 scopus 로고    scopus 로고
    • Dallas Semiconductor (Maxim), DS5002/DS5240 Datasheet. .
    • Dallas Semiconductor (Maxim), DS5002/DS5240 Datasheet. .
  • 18
    • 52949140300 scopus 로고    scopus 로고
    • ATMEL, AT91SAM7XC256 Preliminary Summary. .
    • ATMEL, AT91SAM7XC256 Preliminary Summary. .
  • 19
    • 17644426326 scopus 로고    scopus 로고
    • Tree Parity Machine Rekeying Architectures
    • Volkmer M., and Wallner S. Tree Parity Machine Rekeying Architectures. IEEE Trans. Comput. 54 4 (2005) 421-427
    • (2005) IEEE Trans. Comput. , vol.54 , Issue.4 , pp. 421-427
    • Volkmer, M.1    Wallner, S.2
  • 20
    • 33749060160 scopus 로고    scopus 로고
    • M. Volkmer, S. Wallner, A key establishment IP-core for ubiquitous computing, in: Proceedings of the First International Workshop on Secure and Ubiquitous Networks, SUN'05, Copenhagen Business School, Copenhagen, Denmark, IEEE Computer Society, 2005, pp. 241-245.
    • M. Volkmer, S. Wallner, A key establishment IP-core for ubiquitous computing, in: Proceedings of the First International Workshop on Secure and Ubiquitous Networks, SUN'05, Copenhagen Business School, Copenhagen, Denmark, IEEE Computer Society, 2005, pp. 241-245.
  • 21
    • 52949095842 scopus 로고    scopus 로고
    • M. Volkmer, S. Wallner, Lightweight key exchange and stream cipher based solely on Tree Parity Machines, ECRYPT (European Network of Excellence for Cryptology), in: Workshop on RFID and Lightweight Crypto, Graz University of Technology, Graz, Austria, 2005, pp. 102-113.
    • M. Volkmer, S. Wallner, Lightweight key exchange and stream cipher based solely on Tree Parity Machines, ECRYPT (European Network of Excellence for Cryptology), in: Workshop on RFID and Lightweight Crypto, Graz University of Technology, Graz, Austria, 2005, pp. 102-113.
  • 22
    • 0036340335 scopus 로고    scopus 로고
    • Secure exchange of information by synchronization of neural networks
    • Kanter I., Kinzel W., and Kanter E. Secure exchange of information by synchronization of neural networks. Europhys. Lett. 57 1 (2002) 141-147
    • (2002) Europhys. Lett. , vol.57 , Issue.1 , pp. 141-147
    • Kanter, I.1    Kinzel, W.2    Kanter, E.3
  • 23
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • Carter J.L., and Wegman M. Universal classes of hash functions. J. Comput. Syst. Sci. 18 (1977) 143-154
    • (1977) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.2
  • 24
    • 30344451674 scopus 로고    scopus 로고
    • Energy scalable universal hashing
    • Kaps J.P., Yksel K., and Sunar B. Energy scalable universal hashing. IEEE Trans. Comput. 54 12 (2005) 1484-1495
    • (2005) IEEE Trans. Comput. , vol.54 , Issue.12 , pp. 1484-1495
    • Kaps, J.P.1    Yksel, K.2    Sunar, B.3
  • 25
    • 52949127430 scopus 로고    scopus 로고
    • B. Saballus, S. Wallner, M. Volkmer, Secure group communication in ad-hoc networks using Tree Parity Machines, in: Proceedings of the Fourth Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
    • B. Saballus, S. Wallner, M. Volkmer, Secure group communication in ad-hoc networks using Tree Parity Machines, in: Proceedings of the Fourth Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
  • 26
    • 52949113540 scopus 로고    scopus 로고
    • L. Batina, J. Lano, N. Mentens, S.B. Ors, B. Preneel, I. Ver-bauwhede, Energy, performance, area versus security trade-offs for stream ciphers, Katholieke Universiteit Leuven, 2005.
    • L. Batina, J. Lano, N. Mentens, S.B. Ors, B. Preneel, I. Ver-bauwhede, Energy, performance, area versus security trade-offs for stream ciphers, Katholieke Universiteit Leuven, 2005.
  • 27
    • 52949099605 scopus 로고    scopus 로고
    • CAST Inc., AES Core. .
    • CAST Inc., AES Core. .
  • 28
    • 52949144310 scopus 로고    scopus 로고
    • T. Good, W. Chelton, M. Benaissa, Review of stream cipher candidates from a low resource hardware perspective, University of Sheffield.
    • T. Good, W. Chelton, M. Benaissa, Review of stream cipher candidates from a low resource hardware perspective, University of Sheffield.
  • 29
    • 52949091634 scopus 로고    scopus 로고
    • European Network of Excellence for Cryptology, ESTREAM Project. .
    • European Network of Excellence for Cryptology, ESTREAM Project. .
  • 30
    • 52949103039 scopus 로고    scopus 로고
    • PortalPlayer Inc., PP5022 Datasheet. .
    • PortalPlayer Inc., PP5022 Datasheet. .
  • 32
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM (1978).
    • R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM (1978).
  • 33
    • 0034238005 scopus 로고    scopus 로고
    • Interacting neural networks
    • Metzler R., Kinzel W., and Kanter I. Interacting neural networks. Phys. Rev. E 62 2 (2000) 2555-2565
    • (2000) Phys. Rev. E , vol.62 , Issue.2 , pp. 2555-2565
    • Metzler, R.1    Kinzel, W.2    Kanter, I.3
  • 34
    • 0142021471 scopus 로고    scopus 로고
    • Interacting neural networks and cryptography
    • Kramer B. (Ed), Springer
    • Kinzel W., and Kanter I. Interacting neural networks and cryptography. In: Kramer B. (Ed). Advances in Solid State Physics vol. 42 (2002), Springer
    • (2002) Advances in Solid State Physics , vol.42
    • Kinzel, W.1    Kanter, I.2
  • 36
    • 34347219802 scopus 로고    scopus 로고
    • Dynamics of neural cryptography
    • Ruttor A., Kinzel W., and Kanter I. Dynamics of neural cryptography. Phys. Rev. E 75 (2007) 056104
    • (2007) Phys. Rev. E , vol.75 , pp. 056104
    • Ruttor, A.1    Kinzel, W.2    Kanter, I.3
  • 37
    • 41349083924 scopus 로고    scopus 로고
    • Secure key-exchange protocol with an absence of injective functions
    • Mislovaty R., Perchenok Y., Kanter I., and Kinzel W. Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E 66 (2002) 066102
    • (2002) Phys. Rev. E , vol.66 , pp. 066102
    • Mislovaty, R.1    Perchenok, Y.2    Kanter, I.3    Kinzel, W.4
  • 38
    • 52949086912 scopus 로고    scopus 로고
    • T. Alves, D. Felton, TrustZone: Integrated Hardware and Software Security, White Paper, ARM. .
    • T. Alves, D. Felton, TrustZone: Integrated Hardware and Software Security, White Paper, ARM. .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.