Abstract
The science of security informatics has become a rapidly growing field involving different branches of computer science and information technologies. Software protection, particularly for security applications, has become an important area in computer security. This paper proposes a joint compiler/hardware infrastructure – CODESSEAL – for software protection for fully encrypted execution in which both program and data are in encrypted form in memory. The processor is supplemented with an FPGA-based secure hardware component that is capable of fast encryption and decryption, and performs code integrity verification, authentication, and provides protection of the execution control flow. This paper outlines the CODESSEAL approach, the architecture, and presents preliminary performance results.
The research is supported in part by NSF grant CCR-0325207.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cowan, C.: Software Security for Open-Source Systems. IEEE Security and Privacy (2003)
Chang, H., Attallah, M.J.: Protecting Software Code by Guards. In: Proceedings of the 1st International Workshop on Security and Privacy in Digital Rights Management, pp. 160–175 (2000)
Colberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report. Dept of Computer Science, Univ. of Auckland (1997)
Fisher, M.: Protecting binary executables. Embedded Systems Programming 13(2) (2000)
Actel: Design security with Actel FPGAs (2003), http://www.actel.com
Gelbart, O., Narahari, B., Simha, R.: SPEE: A Secure Program Execution environment tool using static and dynamic code verification. In: Proc. the 3rd Trusted Internet Workshop. International High Performance Computing Conference, Bangalore, India (2004)
Kirovski, D., Drinic, M., Potkonjak, M.: Enabling trusted software integrity. In: Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 108–120 (2002)
Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural support for copy and tamper resistant software. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 168–177 (2000)
Smith, S., Austel, V.: Thrusting trusted software: towards a formal model of programmable secure coprocessors. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 83–98 (1998)
Taylor, R., Goldstein, S.: A high-preformance flexible architecture for cryptography. In: Proceedings of the Workshop on Cryptographic Hardware and Software Systems (1999)
Zhuang, X., Zhang, T., Pande, S.: Hardware assisted control flow obfuscation for embedded processors. In: Proc. of Int. Conference on Compilers, Architecture and Synthesis for Embedded Systems, CASES (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gelbart, O., Ott, P., Narahari, B., Simha, R., Choudhary, A., Zambreno, J. (2005). CODESSEAL: Compiler/FPGA Approach to Secure Applications. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_54
Download citation
DOI: https://doi.org/10.1007/11427995_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)