Skip to main content

CODESSEAL: Compiler/FPGA Approach to Secure Applications

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

The science of security informatics has become a rapidly growing field involving different branches of computer science and information technologies. Software protection, particularly for security applications, has become an important area in computer security. This paper proposes a joint compiler/hardware infrastructure – CODESSEAL – for software protection for fully encrypted execution in which both program and data are in encrypted form in memory. The processor is supplemented with an FPGA-based secure hardware component that is capable of fast encryption and decryption, and performs code integrity verification, authentication, and provides protection of the execution control flow. This paper outlines the CODESSEAL approach, the architecture, and presents preliminary performance results.

The research is supported in part by NSF grant CCR-0325207.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cowan, C.: Software Security for Open-Source Systems. IEEE Security and Privacy (2003)

    Google Scholar 

  2. Chang, H., Attallah, M.J.: Protecting Software Code by Guards. In: Proceedings of the 1st International Workshop on Security and Privacy in Digital Rights Management, pp. 160–175 (2000)

    Google Scholar 

  3. Colberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report. Dept of Computer Science, Univ. of Auckland (1997)

    Google Scholar 

  4. Fisher, M.: Protecting binary executables. Embedded Systems Programming 13(2) (2000)

    Google Scholar 

  5. Actel: Design security with Actel FPGAs (2003), http://www.actel.com

  6. Gelbart, O., Narahari, B., Simha, R.: SPEE: A Secure Program Execution environment tool using static and dynamic code verification. In: Proc. the 3rd Trusted Internet Workshop. International High Performance Computing Conference, Bangalore, India (2004)

    Google Scholar 

  7. Kirovski, D., Drinic, M., Potkonjak, M.: Enabling trusted software integrity. In: Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 108–120 (2002)

    Google Scholar 

  8. Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural support for copy and tamper resistant software. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 168–177 (2000)

    Google Scholar 

  9. Smith, S., Austel, V.: Thrusting trusted software: towards a formal model of programmable secure coprocessors. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 83–98 (1998)

    Google Scholar 

  10. Taylor, R., Goldstein, S.: A high-preformance flexible architecture for cryptography. In: Proceedings of the Workshop on Cryptographic Hardware and Software Systems (1999)

    Google Scholar 

  11. Zhuang, X., Zhang, T., Pande, S.: Hardware assisted control flow obfuscation for embedded processors. In: Proc. of Int. Conference on Compilers, Architecture and Synthesis for Embedded Systems, CASES (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gelbart, O., Ott, P., Narahari, B., Simha, R., Choudhary, A., Zambreno, J. (2005). CODESSEAL: Compiler/FPGA Approach to Secure Applications. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_54

Download citation

  • DOI: https://doi.org/10.1007/11427995_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics