Hardware Architectures for Software Security

The need for hardware-based software protection stems primarily from the increasing value of software coupled with the inability to trust software that utilizes or manages shared resources. By correctly utilizing security functions in hardware, trust can be removed from software. Existing hardware...

Full description

Bibliographic Details
Main Author: Edmison, Joshua Nathaniel
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2014
Subjects:
Online Access:http://hdl.handle.net/10919/29244
http://scholar.lib.vt.edu/theses/available/etd-10112006-204811/
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-29244
record_format oai_dc
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-292442020-09-26T05:30:39Z Hardware Architectures for Software Security Edmison, Joshua Nathaniel Electrical and Computer Engineering Jones, Mark T. Abbott, A. Lynn Martin, Thomas L. Athanas, Peter M. Patterson, Cameron D. Brown, Ezra A. security information flow architecture FPGA configurable graph theory The need for hardware-based software protection stems primarily from the increasing value of software coupled with the inability to trust software that utilizes or manages shared resources. By correctly utilizing security functions in hardware, trust can be removed from software. Existing hardware-based software protection solutions generally suffer from utilization of trusted software, lack of implementation, and/or extreme measures such as processor redesign. In contrast, the research outlined in this document proposes that substantial, hardware-based software protection can be achieved, without trusting software or redesigning the processor, by augmenting existing processors with security management hardware placed outside of the processor boundary. Benefits of this approach include the ability to add security features to nearly any processor, update security features without redesigning the processor, and provide maximum transparency to the software development and distribution processes. The major contributions of this research include the the augmentation methodology, design principles, and a graph-based method for analyzing hardware-based security systems. Ph. D. 2014-03-14T20:17:17Z 2014-03-14T20:17:17Z 2006-06-30 2006-10-11 2007-10-20 2006-10-20 Dissertation etd-10112006-204811 http://hdl.handle.net/10919/29244 http://scholar.lib.vt.edu/theses/available/etd-10112006-204811/ edmison_joshua_dissertation.pdf In Copyright http://rightsstatements.org/vocab/InC/1.0/ application/pdf Virginia Tech
collection NDLTD
format Others
sources NDLTD
topic security
information flow
architecture
FPGA
configurable
graph theory
spellingShingle security
information flow
architecture
FPGA
configurable
graph theory
Edmison, Joshua Nathaniel
Hardware Architectures for Software Security
description The need for hardware-based software protection stems primarily from the increasing value of software coupled with the inability to trust software that utilizes or manages shared resources. By correctly utilizing security functions in hardware, trust can be removed from software. Existing hardware-based software protection solutions generally suffer from utilization of trusted software, lack of implementation, and/or extreme measures such as processor redesign. In contrast, the research outlined in this document proposes that substantial, hardware-based software protection can be achieved, without trusting software or redesigning the processor, by augmenting existing processors with security management hardware placed outside of the processor boundary. Benefits of this approach include the ability to add security features to nearly any processor, update security features without redesigning the processor, and provide maximum transparency to the software development and distribution processes. The major contributions of this research include the the augmentation methodology, design principles, and a graph-based method for analyzing hardware-based security systems. === Ph. D.
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
Edmison, Joshua Nathaniel
author Edmison, Joshua Nathaniel
author_sort Edmison, Joshua Nathaniel
title Hardware Architectures for Software Security
title_short Hardware Architectures for Software Security
title_full Hardware Architectures for Software Security
title_fullStr Hardware Architectures for Software Security
title_full_unstemmed Hardware Architectures for Software Security
title_sort hardware architectures for software security
publisher Virginia Tech
publishDate 2014
url http://hdl.handle.net/10919/29244
http://scholar.lib.vt.edu/theses/available/etd-10112006-204811/
work_keys_str_mv AT edmisonjoshuanathaniel hardwarearchitecturesforsoftwaresecurity
_version_ 1719340642911387648