Designing secure cryptographic accelerators with information flow enforcement: A case study on AES

14Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Designing a secure cryptographic accelerator is challenging as vulnerabilities may arise from design decisions and implementation flaws. To provide high security assurance, we propose to design and build cryptographic accelerators with hardware-level information flow control so that the security of an implementation can be formally verified. This paper uses an AES accelerator as a case study to demonstrate how to express security requirements of a cryptographic accelerator as information flow policies for security enforcement. Our AES prototype on an FPGA shows that the proposed protection has a marginal impact on area and performance.

Cite

CITATION STYLE

APA

Jiang, Z., Jin, H., Suh, G. E., & Zhang, Z. (2019). Designing secure cryptographic accelerators with information flow enforcement: A case study on AES. In Proceedings - Design Automation Conference. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1145/3316781.3317798

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free