Hardware Architectures for Software Security
dc.contributor.author | Edmison, Joshua Nathaniel | en |
dc.contributor.committeechair | Jones, Mark T. | en |
dc.contributor.committeemember | Abbott, A. Lynn | en |
dc.contributor.committeemember | Martin, Thomas L. | en |
dc.contributor.committeemember | Athanas, Peter M. | en |
dc.contributor.committeemember | Patterson, Cameron D. | en |
dc.contributor.committeemember | Brown, Ezra A. | en |
dc.contributor.department | Electrical and Computer Engineering | en |
dc.date.accessioned | 2014-03-14T20:17:17Z | en |
dc.date.adate | 2006-10-20 | en |
dc.date.available | 2014-03-14T20:17:17Z | en |
dc.date.issued | 2006-06-30 | en |
dc.date.rdate | 2007-10-20 | en |
dc.date.sdate | 2006-10-11 | en |
dc.description.abstract | The need for hardware-based software protection stems primarily from the increasing value of software coupled with the inability to trust software that utilizes or manages shared resources. By correctly utilizing security functions in hardware, trust can be removed from software. Existing hardware-based software protection solutions generally suffer from utilization of trusted software, lack of implementation, and/or extreme measures such as processor redesign. In contrast, the research outlined in this document proposes that substantial, hardware-based software protection can be achieved, without trusting software or redesigning the processor, by augmenting existing processors with security management hardware placed outside of the processor boundary. Benefits of this approach include the ability to add security features to nearly any processor, update security features without redesigning the processor, and provide maximum transparency to the software development and distribution processes. The major contributions of this research include the the augmentation methodology, design principles, and a graph-based method for analyzing hardware-based security systems. | en |
dc.description.degree | Ph. D. | en |
dc.identifier.other | etd-10112006-204811 | en |
dc.identifier.sourceurl | http://scholar.lib.vt.edu/theses/available/etd-10112006-204811/ | en |
dc.identifier.uri | http://hdl.handle.net/10919/29244 | en |
dc.publisher | Virginia Tech | en |
dc.relation.haspart | edmison_joshua_dissertation.pdf | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | security | en |
dc.subject | information flow | en |
dc.subject | Architecture | en |
dc.subject | Field programmable gate arrays | en |
dc.subject | configurable | en |
dc.subject | graph theory | en |
dc.title | Hardware Architectures for Software Security | en |
dc.type | Dissertation | en |
thesis.degree.discipline | Electrical and Computer Engineering | en |
thesis.degree.grantor | Virginia Polytechnic Institute and State University | en |
thesis.degree.level | doctoral | en |
thesis.degree.name | Ph. D. | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- edmison_joshua_dissertation.pdf
- Size:
- 2.29 MB
- Format:
- Adobe Portable Document Format