|
|
|
|
|
| THURSDAY, June 10, 2004, 2:00 PM - 4:00 PM | Room: 6A |
|
TOPIC AREA: SYSTEM-LEVEL DESIGN AND VERIFICATION
|
|
SESSION 46
|
| Special Session: Security as a New Dimension in Embedded System Design
|
| Chair: Srivaths Ravi - NEC Corp., Princeton, NJ
| | Organizers: Srivaths Ravi
|
| The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. This special session is intended to introduce the challenges involved in designing secure embedded systems to embedded system designers and design tool developers. The session will provide a unified and holistic view of embedded system security: "Security is often mis-construed by designers as the hardware or software implementation of specific cryptographic algorithms and security protocols, whereas in reality it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, power, etc."
Speakers will provide a clear introduction of typical functional security requirements for embedded systems from an end-user perspective. They will identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc). The speakers will also provide an overview of solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.
|
| 46.1 |
Security Challenges in Embedded System Design
|
| Speaker(s): | Anand Raghunathan - NEC Corp., Princeton, NJ
|
| Author(s): | Anand Raghunathan - NEC Corp., Princeton, NJ
|
| 46.2 | Exploiting Embedded Software |
| Speaker(s): | Gary McGraw - Cigital, Inc., Dulles, VA
|
| Author(s): | Gary McGraw - Cigital, Inc., Dulles, VA
|
| 46.3 | Processor Architectures for Efficient Secure Information Processing |
| Speaker(s): | Ruby Lee - Princeton Univ., Princeton, NJ
|
| Author(s): | Ruby Lee - Princeton Univ., Princeton, NJ
|
| 46.4 | Attacks and Countermeasures for Tamper-Resistant Embedded Hardware Devices |
| Speaker(s): | Paul Kocher - Cryptography Research, Inc., San Francisco, CA
|
| Author(s): | Paul Kocher - Cryptography Research, Inc., San Francisco, CA
|
  |
|