Security

An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors

Download Now Free registration required

Executive Summary

An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring data integrity and confidentiality is of the utmost importance in many such applications. This paper describes a practical implementation of security extensions for embedded systems built around soft-core processors. These extensions guarantee the integrity and confidentiality of sensitive data residing in external memory and prevent various types of physical attacks on systems working in adverse conditions.

  • Format: PDF
  • Size: 131.43 KB