< Back to previous page

Project

A security architecture for trustworthy networked embedded systems.

This project considers the security of networked embedded devices.
Many embedded systems provide hardware security extensions such as custominstruction or co-processors instead of standard security features present in high-end processors. We intend to explore what the advantages, limits and trade-offs are of software support for specific hardware security. This includes a secure boot process, runtime integrity and remote verification, dedicated instructions and registers and key storage based on Physically Unclonable Functions (PUFs).
The goal of our research isto arrive to a generic architecture and fundamental design methodology for security that offers support in software for advanced hardware security features. This will offer a more flexible and adaptive approach compared to dedicated cryptographic co-processors, while it can still overcome the "turtle-upon-turtle" problem of a software only protection. During our research, we intend to develop suitable models and metrics for this context, as this is essential to evaluate the solutions that will be developed.
Date:1 Oct 2010 →  20 Oct 2012
Keywords:Embedded, Security architecture, Hardware, Physically Unclonable Functions, Secure boot process, Runtime integrity, Remote verification, Softwar
Disciplines:Applied mathematics in specific fields, Computer architecture and networks, Distributed computing, Information sciences, Information systems, Programming languages, Scientific computing, Theoretical computer science, Visual computing, Other information and computing sciences, Computer hardware, Computer theory, Other computer engineering, information technology and mathematical engineering, Communications, Communications technology
Project type:PhD project