Title:
Loss-Tolerant and Secure Embedded Computing via Inscrutable Instruction-Set Architectures (I²SA)
Loss-Tolerant and Secure Embedded Computing via Inscrutable Instruction-Set Architectures (I²SA)
Authors
Mooney, Vincent John, III
Palem, Krishna V.
Wunderlich, Richard B.
Palem, Krishna V.
Wunderlich, Richard B.
Authors
Person
Advisors
Advisors
Associated Organizations
Organizational Unit
Series
Collections
Supplementary to
Permanent Link
Abstract
In short, we examine secure
computing where a microprocessor reads, writes and
executes operations ideally in an inscrutable domain. The goal is to provide methods and
implementations for computation where data never leave the inscrutable domain in which they
reside; the intended effect is twofold. The first intended effect is that any transmissions between
computing media using our approach would be unbreakable in any reasonable amount of time;
i.e., intercepted instructions and/or data would be meaningless to the unauthorized interceptor.
The second intended effect is that, as a result of embedded computing platforms realized using
inscrutable computing elements, any loss of equipment utilizing such computing hardware would
not be very meaningful to the recoverer: we refer to this as loss tolerance.
Sponsor
Date Issued
2004
Extent
683658 bytes
Resource Type
Text
Resource Subtype
Technical Report