Security as a new dimension in embedded system design

The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2004 41st Conference Design Automation s. 753 - 760
Hlavní autori: Kocher, Paul, Lee, Ruby, McGraw, Gary, Raghunathan, Anand
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: New York, NY, USA ACM 01.01.2004
IEEE
Association for Computing Machinery
Edícia:ACM Conferences
Predmet:
ISBN:1581138288, 9781581138283, 1511838288
ISSN:0738-100X
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these efforts, security is often mis-construed by designers as the hardware or software implementation of specific cryptographic algorithms and security protocols. In reality, it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, and power..This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.
AbstractList The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these efforts, security is often mis-construed by designers as the hardware or software implementation of specific cryptographic algorithms and security protocols. In reality, it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, and power..This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.
Author Kocher, Paul
Raghunathan, Anand
McGraw, Gary
Lee, Ruby
Author_xml – sequence: 1
  givenname: Paul
  surname: Kocher
  fullname: Kocher, Paul
  organization: Cryptography Research, San Francisco, CA
– sequence: 2
  givenname: Ruby
  surname: Lee
  fullname: Lee, Ruby
  organization: Princeton University, Princeton, NJ
– sequence: 3
  givenname: Gary
  surname: McGraw
  fullname: McGraw, Gary
  organization: Cigital, Dulles, VA
– sequence: 4
  givenname: Anand
  surname: Raghunathan
  fullname: Raghunathan, Anand
  organization: NEC Laboratories America, Princeton, NJ
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17345566$$DView record in Pascal Francis
BookMark eNqNkD1PwzAQhi0BEm3pyMTiBSZS7NiOnRFVfEmVGACJzbo4F2RInBKnQv33GLVSV255h3vuQ8-UHIc-ICHnnC04l-qmLAtVFIsUWvMjMuXKcC5MbswxmTAtTMYZez8l8xg_WSqtSy3FhKgXdJvBj1sKkQIN-ENr32GIvg_UB4pdhXWNNY3bOGJHa4z-I5yRkwbaiPN9zsjb_d3r8jFbPT88LW9XGYjCjJkqdVOkadDaQHqCV4ZLbQqFudIStGoQlHECSqdMA0pWtWSoRV4yB1ooMSNXu73rof_eYBxt56PDtoWA_SZawZVUXJsEXu5BiA7aZoDgfLTrwXcwbC3XQqrkJ3EXO84j4qEt8lwZcTgHrrNV339Fy5n982t3fu3ObwKv_wXaavDYiF9hgnfp
ContentType Conference Proceeding
Copyright 2004 ACM
2006 INIST-CNRS
Copyright_xml – notice: 2004 ACM
– notice: 2006 INIST-CNRS
DBID 6IE
6IH
CBEJK
RIE
RIO
IQODW
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1145/996566.996771
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP) 1998-present
Pascal-Francis
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EndPage 760
ExternalDocumentID 17345566
1322583
Genre orig-research
Conference Paper
GroupedDBID 6IE
6IH
6IK
6IL
AAJGR
AAVQY
ACM
ADPZR
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
GUFHI
OCL
RIE
RIL
RIO
123
29O
6IF
6IM
6IN
AAWTH
ACGFS
ADZIZ
CHZPO
IEGSK
IJVOP
IPLJI
M43
RNS
IQODW
LHSKQ
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-a368t-597f6ddea778a0731b8147865e2574a75fea58c3a9c58fa54bd40e73290ca7353
IEDL.DBID RIE
ISBN 1581138288
9781581138283
1511838288
ISICitedReferencesCount 187
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000223078800157&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0738-100X
IngestDate Fri Jul 11 08:47:44 EDT 2025
Wed Apr 02 07:19:04 EDT 2025
Tue Aug 26 18:32:47 EDT 2025
Wed Jan 31 06:48:08 EST 2024
IsPeerReviewed false
IsScholarly true
Keywords architectures
viruses
PDAs
security processing
design methodologies
digital rights management
cryptography
software attacks
battery life
security protocols
tamper resistance
security
performance
sensors
embedded systems
design
trusted computing
Performance evaluation
System architecture
Circuit design
System design
Secondary cell
Algorithm
Embedded systems
Power consumption
Information protection
Electronic component
Software
Cryptography
Computer aided design
Language English
License Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org
CC BY 4.0
LinkModel DirectLink
MeetingName DAC04: The 41st Annual Design Automation Conference 2004
MergedId FETCHMERGED-LOGICAL-a368t-597f6ddea778a0731b8147865e2574a75fea58c3a9c58fa54bd40e73290ca7353
Notes SourceType-Conference Papers & Proceedings-1
ObjectType-Conference Paper-1
content type line 25
PQID 31545178
PQPubID 23500
PageCount 8
ParticipantIDs acm_books_10_1145_996566_996771
ieee_primary_1322583
acm_books_10_1145_996566_996771_brief
proquest_miscellaneous_31545178
pascalfrancis_primary_17345566
PublicationCentury 2000
PublicationDate 2004-01-01
PublicationDateYYYYMMDD 2004-01-01
PublicationDate_xml – month: 01
  year: 2004
  text: 2004-01-01
  day: 01
PublicationDecade 2000
PublicationPlace New York, NY, USA
PublicationPlace_xml – name: New York, NY, USA
– name: New York NY
– name: Piscataway NJ
PublicationSeriesTitle ACM Conferences
PublicationTitle 2004 41st Conference Design Automation
PublicationTitleAbbrev DAC
PublicationYear 2004
Publisher ACM
IEEE
Association for Computing Machinery
Publisher_xml – name: ACM
– name: IEEE
– name: Association for Computing Machinery
SSID ssj0000779743
ssj0004161
Score 2.0697038
Snippet The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic...
SourceID proquest
pascalfrancis
ieee
acm
SourceType Aggregation Database
Index Database
Publisher
StartPage 753
SubjectTerms Algorithm design and analysis
Applied computing -- Computers in other domains -- Personal computers and PC applications
Applied sciences
Communication system security
Computer networks
Computer systems organization -- Architectures
Computer systems organization -- Architectures -- Parallel architectures -- Very long instruction word
Computer systems organization -- Architectures -- Serial architectures -- Complex instruction set computing
Computer systems organization -- Architectures -- Serial architectures -- Reduced instruction set computing
Data security
Design methodology
Design. Technologies. Operation analysis. Testing
Electronics
Embedded computing
Embedded system
Exact sciences and technology
General and reference -- Document types -- Computing standards, RFCs and guidelines
Information security
Integrated circuits
Power system security
Public key cryptography
Security and privacy -- Cryptography -- Public key (asymmetric) techniques
Security and privacy -- Cryptography -- Public key (asymmetric) techniques -- Public key encryption
Semiconductor electronics. Microelectronics. Optoelectronics. Solid state devices
Software and its engineering
Title Security as a new dimension in embedded system design
URI https://ieeexplore.ieee.org/document/1322583
https://www.proquest.com/docview/31545178
WOSCitedRecordID wos000223078800157&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5a8aAX31gfNQe9ubptkk32LBZPpaBCb2F2dwI9uJVu6-93stuHoiCeNrAhhC-vmWS-bwCuZdCbTchHOR9HkSrYZ8289hEpTPt949PYF3WyCTMc2vE4HbXgds2FIaI6-IzuQrF-yy-m-SJcld0Hz0lb2Ya2MUnD1dpwIHu1NirP2CBXGo8DiStYz5JdCrsS11T6nu17tmDu-GMCbb6N-dsysUoIi8SKkfFNSosfu3N95Az2_tfZfTjecPfEaH0qHUCLykPY_SI7eAT6eZm0TmAlULBhLYog8h8uzsSkFPSWEe9HhWhknkVRR3kcw-vg8eXhKVqmT4hQJnYesavgE66NxlhkXHqZ7SljE028TBUa7Qm1zSWmubYetcoKFZOR_TTO0UgtT2CrnJZ0CsJm2iOPtbVcxyYqQ-nZEcHc24SS2HbginF0wS-oXEN11q5B2jVId-Dmjxoum03Id-AoQOneG60Nt0SxA91vY7P5b6TS3Aj3YDVYjhdIePXAkqaLyslgJPaMPfu95XPYaYJxwq3KBWzNZwu6hO38Yz6pZt16jn0C8gnKVA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB58gXrxjeszB71Z7W6SJj2LoqiLoMLewrSdwB62K9tdf7-TdnUVBfHUQEMIX14zyXzfAJzIoDebkI9yPo4iVbDPmnntI1KYdjrGp7Ev6mQTptu1vV76OAdnn1wYIqqDz-g8FOu3_GKYT8JV2UXwnLSV87ColerEDVtrxoJs1-qoPGeDYGncCzSuYD9Ldirsh7ym0hds4bMNc84fE4jz85gPpqlVQmAkVoyNb5Ja_Nif60Pneu1_3V2H7Rl7Tzx-nksbMEflJqx-ER7cAv00TVsnsBIo2LQWRZD5D1dnol8KGmTEO1IhGqFnUdRxHtvwcn31fHkTTRMoRCgTO47YWfAJ10ZjLDIu7cy2lbGJJl6oCo32hNrmEtNcW49aZYWKychOGudopJY7sFAOS9oFYTPtkUfbWq5jE5Wh9OyKYO5tQklsW3DMOLrgGVSuITtr1yDtGqRbcPpHDZeN-uRbsBWgdK-N2oabotiCo29jM_tvpNLcCPfgY7AcL5Hw7oElDSeVk8FMbBu793vLx7B88_xw7-5vu3f7sNKE5oQ7lgNYGI8mdAhL-du4X42O6vn2DqeAzZs
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+-+ACM+IEEE+Design+Automation+Conference&rft.atitle=Security+as+a+new+dimension+in+embedded+system+design&rft.au=Kocher%2C+P.&rft.au=Lee%2C+R.&rft.au=McGraw%2C+G.&rft.au=Raghunathan%2C+A.&rft.date=2004-01-01&rft.pub=IEEE&rft.isbn=1511838288&rft.issn=0738-100X&rft.spage=753&rft.epage=760&rft_id=info:doi/10.1145%2F996566.996771&rft.externalDocID=1322583
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0738-100X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0738-100X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0738-100X&client=summon