DocumentCode :
500848
Title :
Hardware authentication leveraging performance limits in detailed simulations and emulations
Author :
Deng, Daniel Y. ; Chan, Andrew H. ; Suh, G. Edward
Author_Institution :
Cornell Univ., Ithaca, NY, USA
fYear :
2009
fDate :
26-31 July 2009
Firstpage :
682
Lastpage :
687
Abstract :
This paper proposes a novel approach to check the authenticity of hardware based on the inevitable performance gap between real hardware and simulations or emulations that impersonate it. More specifically, we demonstrate that each processor design can be authenticated by requiring a checksum incorporating internals of complex microarchitectural mechanisms to be computed within a time limit; this checksum is different for each processor model and only authentic secure hardware can obtain the checksum fast enough. This new authentication approach provides attractive solutions to privacy, scaling, and security issues of traditional approaches that otherwise rely only on certificates. Architectural simulations and an RTL implementation show that the proposed approach is viable with very low hardware overheads.
Keywords :
hybrid simulation; microcomputers; performance evaluation; simulation; RTL implementation; checksum; hardware authentication; hardware security; microarchitectural mechanisms; performance gap; software emulation; Application software; Authentication; Computational modeling; Emulation; Hardware; Microprocessors; Permission; Privacy; Public key; Security; Hardware authentication; Secure processors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design Automation Conference, 2009. DAC '09. 46th ACM/IEEE
Conference_Location :
San Francisco, CA
ISSN :
0738-100X
Print_ISBN :
978-1-6055-8497-3
Type :
conf
Filename :
5227105
Link To Document :
بازگشت