Challenges and Opportunities for Hardware-Assisted Security Improvements in the Field

被引:2
|
作者
Tan, Benjamin [1 ]
机构
[1] Univ Calgary, Dept Elect & Software Engn, Calgary, AB, Canada
关键词
SOFTWARE; ARCHITECTURE; FIREWALL;
D O I
10.1109/ISQED54688.2022.9806254
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
With our growing reliance on computer systems, designers increasingly look to hardware-based solutions for improving security in the face of many cybersecurity threats. Hardware-assisted security can take myriad forms, including integrating hardware components that monitor and respond to unexpected changes in system behaviour. However, systematically making decisions about what types of hardware for security improvement to incorporate, as well as designing and implementing the actual hardware, continues to be challenging. Moreover, the current attitude is that once the hardware has been committed to silicon, it is almost impossible to modify. In this paper, we provide an overview of some of the challenges that designers might face when incorporating hardware-based security approaches into system-on-chip designs and discuss some opportunities for research in this domain. In particular, we focus on design time considerations that can impact the ongoing security of systems in the field.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [41] Hardware-assisted instruction profiling and latency detection
    Sharma, Suchakrapani Datt
    Dagenais, Michel
    JOURNAL OF ENGINEERING-JOE, 2016,
  • [42] Detecting Hardware-Assisted Virtualization with Inconspicuous Features
    Zhang, Zhi
    Cheng, Yueqiang
    Gao, Yansong
    Nepal, Surya
    Liu, Dongxi
    Zou, Yi
    IEEE Transactions on Information Forensics and Security, 2021, 16 : 16 - 27
  • [43] Hardware-Assisted Transparent Tracing and Debugging on ARM
    Ning, Zhenyu
    Zhang, Fengwei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1595 - 1609
  • [44] Enforcing kernel constraints by hardware-assisted virtualization
    Lacombe, Eric
    Nicomette, Vincent
    Deswarte, Yves
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (01): : 1 - 21
  • [45] Detecting Hardware-Assisted Virtualization With Inconspicuous Features
    Zhang, Zhi
    Cheng, Yueqiang
    Gao, Yansong
    Nepal, Surya
    Liu, Dongxi
    Zou, Yi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 16 - 27
  • [46] HAFIX: Hardware-Assisted Flow Integrity Extension
    Davi, Lucas
    Hanreich, Matthias
    Paul, Debayan
    Sadeghi, Ahmad-Reza
    Koeberl, Patrick
    Sullivan, Dean
    Arias, Orlando
    Jin, Yier
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [47] Empirical analysis of hardware-assisted GPU virtualization
    Garg, Anshuj
    Kulkarni, Purushottam
    Kurkure, Uday
    Sivaraman, Han
    Vu, Lan
    2019 IEEE 26TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA, AND ANALYTICS (HIPC), 2019, : 395 - 405
  • [48] Hardware-Assisted Program Execution Integrity: HAPEI
    Lashermes, Ronan
    Le Bouder, Helene
    Thomas, Gael
    SECURE IT SYSTEMS, 2018, 11252 : 405 - 420
  • [49] Interactive space deformation with hardware-assisted rendering
    Kurzion, Y
    Yagel, R
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1997, 17 (05) : 66 - 77
  • [50] PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE)
    Mohanty, Saraju P.
    Yanambaka, Venkata P.
    Kougianos, Elias
    Puthal, Deepak
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 8 - 16