Title:
Loss-Tolerant and Secure Embedded Computing via Inscrutable Instruction-Set Architectures (I²SA)
Loss-Tolerant and Secure Embedded Computing via Inscrutable Instruction-Set Architectures (I²SA)
dc.contributor.author | Mooney, Vincent John, III | en_US |
dc.contributor.author | Palem, Krishna V. | |
dc.contributor.author | Wunderlich, Richard B. | |
dc.date.accessioned | 2005-06-17T17:36:18Z | |
dc.date.available | 2005-06-17T17:36:18Z | |
dc.date.issued | 2004 | en_US |
dc.description.abstract | In short, we examine secure computing where a microprocessor reads, writes and executes operations ideally in an inscrutable domain. The goal is to provide methods and implementations for computation where data never leave the inscrutable domain in which they reside; the intended effect is twofold. The first intended effect is that any transmissions between computing media using our approach would be unbreakable in any reasonable amount of time; i.e., intercepted instructions and/or data would be meaningless to the unauthorized interceptor. The second intended effect is that, as a result of embedded computing platforms realized using inscrutable computing elements, any loss of equipment utilizing such computing hardware would not be very meaningful to the recoverer: we refer to this as loss tolerance. | en_US |
dc.format.extent | 683658 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1853/6497 | |
dc.language.iso | en_US | |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | CC Technical Report; GIT-CC-04-12 | en_US |
dc.subject | Computer security | |
dc.subject | Cryptography | |
dc.title | Loss-Tolerant and Secure Embedded Computing via Inscrutable Instruction-Set Architectures (I²SA) | en_US |
dc.type | Text | |
dc.type.genre | Technical Report | |
dspace.entity.type | Publication | |
local.contributor.author | Mooney, Vincent John, III | |
local.contributor.corporatename | College of Computing | |
local.relation.ispartofseries | College of Computing Technical Report Series | |
relation.isAuthorOfPublication | 1068070d-f7e9-4b9c-9be6-72023d13e2a1 | |
relation.isOrgUnitOfPublication | c8892b3c-8db6-4b7b-a33a-1b67f7db2021 | |
relation.isSeriesOfPublication | 35c9e8fc-dd67-4201-b1d5-016381ef65b8 |
Files
Original bundle
1 - 1 of 1