Hardware/software co-design approaches to system security

Research output: Contribution to journalConference articlepeer-review


Computer and Information security has become a critical and central problem in this connected "anytime, anywhere" world. One of the key problems facing the computer industry today involves ensuring the integrity of end-user applications and data. One way to consider the security problem is the unauthorized execution of code on a particular system. Researchers in the relatively new field of software protection investigate the development and evaluation of controls that prevent unauthorized modification or use of system software. While many previously developed protection schemes have provided a strong level of security, their overall effectiveness has been hindered by a lack of transparency to the user in terms of performance overhead. Other approaches are on the opposite extreme and sacrifice security for the sake of this need for transparency. In this talk, the speaker will present an architecture for software protection that provides both security and user transparency by utilizing the concepts of multiple programmable cores on modern processors. The usage of additional resources dynamically enhance security and protection using the co-processing paradigm. Initial results show how the use of FPGAs as co-processors can accelerate execution of programs in a cryptographic environment, while maintaining the flexibility through reprogramming to carry out any compiler-driven protections that may be application-specific. Finally, the speaker describes some of the specific problems such as untrusted foundry, multi-level separation, etc. that is being addressed using the overall approach.

Original languageEnglish (US)
Pages (from-to)xxxv
JournalProceedings - IEEE Symposium on Computers and Communications
StatePublished - Nov 10 2005
Event10th IEEE Symposium on Computers and Communications, ISCC 2005 - Murcia, Spain
Duration: Jun 27 2005Jun 30 2005

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Mathematics(all)
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Hardware/software co-design approaches to system security'. Together they form a unique fingerprint.

Cite this