Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several...
Uložené v:
| Vydané v: | 2004 41st Conference Design Automation s. 753 - 760 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
New York, NY, USA
ACM
01.01.2004
IEEE Association for Computing Machinery |
| Edícia: | ACM Conferences |
| Predmet: | |
| ISBN: | 1581138288, 9781581138283, 1511838288 |
| ISSN: | 0738-100X |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these efforts, security is often mis-construed by designers as the hardware or software implementation of specific cryptographic algorithms and security protocols. In reality, it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, and power..This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies. |
|---|---|
| AbstractList | The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these efforts, security is often mis-construed by designers as the hardware or software implementation of specific cryptographic algorithms and security protocols. In reality, it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, and power..This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies. |
| Author | Kocher, Paul Raghunathan, Anand McGraw, Gary Lee, Ruby |
| Author_xml | – sequence: 1 givenname: Paul surname: Kocher fullname: Kocher, Paul organization: Cryptography Research, San Francisco, CA – sequence: 2 givenname: Ruby surname: Lee fullname: Lee, Ruby organization: Princeton University, Princeton, NJ – sequence: 3 givenname: Gary surname: McGraw fullname: McGraw, Gary organization: Cigital, Dulles, VA – sequence: 4 givenname: Anand surname: Raghunathan fullname: Raghunathan, Anand organization: NEC Laboratories America, Princeton, NJ |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17345566$$DView record in Pascal Francis |
| BookMark | eNqNkD1PwzAQhi0BEm3pyMTiBSZS7NiOnRFVfEmVGACJzbo4F2RInBKnQv33GLVSV255h3vuQ8-UHIc-ICHnnC04l-qmLAtVFIsUWvMjMuXKcC5MbswxmTAtTMYZez8l8xg_WSqtSy3FhKgXdJvBj1sKkQIN-ENr32GIvg_UB4pdhXWNNY3bOGJHa4z-I5yRkwbaiPN9zsjb_d3r8jFbPT88LW9XGYjCjJkqdVOkadDaQHqCV4ZLbQqFudIStGoQlHECSqdMA0pWtWSoRV4yB1ooMSNXu73rof_eYBxt56PDtoWA_SZawZVUXJsEXu5BiA7aZoDgfLTrwXcwbC3XQqrkJ3EXO84j4qEt8lwZcTgHrrNV339Fy5n982t3fu3ObwKv_wXaavDYiF9hgnfp |
| ContentType | Conference Proceeding |
| Copyright | 2004 ACM 2006 INIST-CNRS |
| Copyright_xml | – notice: 2004 ACM – notice: 2006 INIST-CNRS |
| DBID | 6IE 6IH CBEJK RIE RIO IQODW 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1145/996566.996771 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP) 1998-present Pascal-Francis Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Applied Sciences |
| EndPage | 760 |
| ExternalDocumentID | 17345566 1322583 |
| Genre | orig-research Conference Paper |
| GroupedDBID | 6IE 6IH 6IK 6IL AAJGR AAVQY ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI OCL RIE RIL RIO 123 29O 6IF 6IM 6IN AAWTH ACGFS ADZIZ CHZPO IEGSK IJVOP IPLJI M43 RNS IQODW LHSKQ 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-a368t-597f6ddea778a0731b8147865e2574a75fea58c3a9c58fa54bd40e73290ca7353 |
| IEDL.DBID | RIE |
| ISBN | 1581138288 9781581138283 1511838288 |
| ISICitedReferencesCount | 187 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000223078800157&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0738-100X |
| IngestDate | Fri Jul 11 08:47:44 EDT 2025 Wed Apr 02 07:19:04 EDT 2025 Tue Aug 26 18:32:47 EDT 2025 Wed Jan 31 06:48:08 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | architectures viruses PDAs security processing design methodologies digital rights management cryptography software attacks battery life security protocols tamper resistance security performance sensors embedded systems design trusted computing Performance evaluation System architecture Circuit design System design Secondary cell Algorithm Embedded systems Power consumption Information protection Electronic component Software Cryptography Computer aided design |
| Language | English |
| License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org CC BY 4.0 |
| LinkModel | DirectLink |
| MeetingName | DAC04: The 41st Annual Design Automation Conference 2004 |
| MergedId | FETCHMERGED-LOGICAL-a368t-597f6ddea778a0731b8147865e2574a75fea58c3a9c58fa54bd40e73290ca7353 |
| Notes | SourceType-Conference Papers & Proceedings-1 ObjectType-Conference Paper-1 content type line 25 |
| PQID | 31545178 |
| PQPubID | 23500 |
| PageCount | 8 |
| ParticipantIDs | acm_books_10_1145_996566_996771 ieee_primary_1322583 acm_books_10_1145_996566_996771_brief proquest_miscellaneous_31545178 pascalfrancis_primary_17345566 |
| PublicationCentury | 2000 |
| PublicationDate | 2004-01-01 |
| PublicationDateYYYYMMDD | 2004-01-01 |
| PublicationDate_xml | – month: 01 year: 2004 text: 2004-01-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | New York, NY, USA |
| PublicationPlace_xml | – name: New York, NY, USA – name: New York NY – name: Piscataway NJ |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | 2004 41st Conference Design Automation |
| PublicationTitleAbbrev | DAC |
| PublicationYear | 2004 |
| Publisher | ACM IEEE Association for Computing Machinery |
| Publisher_xml | – name: ACM – name: IEEE – name: Association for Computing Machinery |
| SSID | ssj0000779743 ssj0004161 |
| Score | 2.0697038 |
| Snippet | The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic... |
| SourceID | proquest pascalfrancis ieee acm |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 753 |
| SubjectTerms | Algorithm design and analysis Applied computing -- Computers in other domains -- Personal computers and PC applications Applied sciences Communication system security Computer networks Computer systems organization -- Architectures Computer systems organization -- Architectures -- Parallel architectures -- Very long instruction word Computer systems organization -- Architectures -- Serial architectures -- Complex instruction set computing Computer systems organization -- Architectures -- Serial architectures -- Reduced instruction set computing Data security Design methodology Design. Technologies. Operation analysis. Testing Electronics Embedded computing Embedded system Exact sciences and technology General and reference -- Document types -- Computing standards, RFCs and guidelines Information security Integrated circuits Power system security Public key cryptography Security and privacy -- Cryptography -- Public key (asymmetric) techniques Security and privacy -- Cryptography -- Public key (asymmetric) techniques -- Public key encryption Semiconductor electronics. Microelectronics. Optoelectronics. Solid state devices Software and its engineering |
| Title | Security as a new dimension in embedded system design |
| URI | https://ieeexplore.ieee.org/document/1322583 https://www.proquest.com/docview/31545178 |
| WOSCitedRecordID | wos000223078800157&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5a8aAX31gfNQe9ubptkk32LBZPpaBCb2F2dwI9uJVu6-93stuHoiCeNrAhhC-vmWS-bwCuZdCbTchHOR9HkSrYZ8289hEpTPt949PYF3WyCTMc2vE4HbXgds2FIaI6-IzuQrF-yy-m-SJcld0Hz0lb2Ya2MUnD1dpwIHu1NirP2CBXGo8DiStYz5JdCrsS11T6nu17tmDu-GMCbb6N-dsysUoIi8SKkfFNSosfu3N95Az2_tfZfTjecPfEaH0qHUCLykPY_SI7eAT6eZm0TmAlULBhLYog8h8uzsSkFPSWEe9HhWhknkVRR3kcw-vg8eXhKVqmT4hQJnYesavgE66NxlhkXHqZ7SljE028TBUa7Qm1zSWmubYetcoKFZOR_TTO0UgtT2CrnJZ0CsJm2iOPtbVcxyYqQ-nZEcHc24SS2HbginF0wS-oXEN11q5B2jVId-Dmjxoum03Id-AoQOneG60Nt0SxA91vY7P5b6TS3Aj3YDVYjhdIePXAkqaLyslgJPaMPfu95XPYaYJxwq3KBWzNZwu6hO38Yz6pZt16jn0C8gnKVA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB58gXrxjeszB71Z7W6SJj2LoqiLoMLewrSdwB62K9tdf7-TdnUVBfHUQEMIX14zyXzfAJzIoDebkI9yPo4iVbDPmnntI1KYdjrGp7Ev6mQTptu1vV76OAdnn1wYIqqDz-g8FOu3_GKYT8JV2UXwnLSV87ColerEDVtrxoJs1-qoPGeDYGncCzSuYD9Ldirsh7ym0hds4bMNc84fE4jz85gPpqlVQmAkVoyNb5Ja_Nif60Pneu1_3V2H7Rl7Tzx-nksbMEflJqx-ER7cAv00TVsnsBIo2LQWRZD5D1dnol8KGmTEO1IhGqFnUdRxHtvwcn31fHkTTRMoRCgTO47YWfAJ10ZjLDIu7cy2lbGJJl6oCo32hNrmEtNcW49aZYWKychOGudopJY7sFAOS9oFYTPtkUfbWq5jE5Wh9OyKYO5tQklsW3DMOLrgGVSuITtr1yDtGqRbcPpHDZeN-uRbsBWgdK-N2oabotiCo29jM_tvpNLcCPfgY7AcL5Hw7oElDSeVk8FMbBu793vLx7B88_xw7-5vu3f7sNKE5oQ7lgNYGI8mdAhL-du4X42O6vn2DqeAzZs |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+-+ACM+IEEE+Design+Automation+Conference&rft.atitle=Security+as+a+new+dimension+in+embedded+system+design&rft.au=Kocher%2C+P.&rft.au=Lee%2C+R.&rft.au=McGraw%2C+G.&rft.au=Raghunathan%2C+A.&rft.date=2004-01-01&rft.pub=IEEE&rft.isbn=1511838288&rft.issn=0738-100X&rft.spage=753&rft.epage=760&rft_id=info:doi/10.1145%2F996566.996771&rft.externalDocID=1322583 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0738-100X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0738-100X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0738-100X&client=summon |

