Abstract
Designing a secure cryptographic accelerator is challenging as vulnerabilities may arise from design decisions and implementation flaws. To provide high security assurance, we propose to design and build cryptographic accelerators with hardware-level information flow control so that the security of an implementation can be formally verified. This paper uses an AES accelerator as a case study to demonstrate how to express security requirements of a cryptographic accelerator as information flow policies for security enforcement. Our AES prototype on an FPGA shows that the proposed protection has a marginal impact on area and performance.
Cite
CITATION STYLE
Jiang, Z., Jin, H., Suh, G. E., & Zhang, Z. (2019). Designing secure cryptographic accelerators with information flow enforcement: A case study on AES. In Proceedings - Design Automation Conference. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1145/3316781.3317798
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.