Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption.
Stephan KleberFlorian UntersteinMatthias MatousekFrank KarglFrank SlomkaMatthias HillerPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- data flow
- application level
- code generation
- key management
- digital rights management
- execution model
- security analysis
- security properties
- control flow
- key exchange
- execution environment
- encryption scheme
- electronic devices
- software architecture
- memory hierarchy
- instruction set
- data encryption
- advanced encryption standard
- workflow engine
- stream cipher
- instruction set architecture
- java virtual machine
- private key
- cryptographic protocols
- security requirements
- formal model