Title:
Loss-Tolerant and Secure Embedded Computing via Inscrutable Instruction-Set Architectures (I²SA)

Thumbnail Image
Author(s)
Mooney, Vincent John, III
Palem, Krishna V.
Wunderlich, Richard B.
Authors
Advisor(s)
Advisor(s)
Editor(s)
Associated Organization(s)
Organizational Unit
Supplementary to
Abstract
In short, we examine secure computing where a microprocessor reads, writes and executes operations ideally in an inscrutable domain. The goal is to provide methods and implementations for computation where data never leave the inscrutable domain in which they reside; the intended effect is twofold. The first intended effect is that any transmissions between computing media using our approach would be unbreakable in any reasonable amount of time; i.e., intercepted instructions and/or data would be meaningless to the unauthorized interceptor. The second intended effect is that, as a result of embedded computing platforms realized using inscrutable computing elements, any loss of equipment utilizing such computing hardware would not be very meaningful to the recoverer: we refer to this as loss tolerance.
Sponsor
Date Issued
2004
Extent
683658 bytes
Resource Type
Text
Resource Subtype
Technical Report
Rights Statement
Rights URI