Show simple item record

dc.contributor.authorRen, Ling
dc.contributor.authorFletcher, Christopher W
dc.contributor.authorKwon, Albert
dc.contributor.authorvan Dijk, Marten
dc.contributor.authorDevadas, Srinivas
dc.date.accessioned2021-10-27T20:29:07Z
dc.date.available2021-10-27T20:29:07Z
dc.date.issued2019
dc.identifier.urihttps://hdl.handle.net/1721.1/135751
dc.description.abstract© 2004-2012 IEEE. This paper presents post-silicon results for the Ascend secure processor, taped out in a 32 nm SOI process. Ascend prevents information leakage over a processor's digital I/O pins-in particular, the processor's requests to external memory-and certifies the program's execution by verifying the integrity of the external memory. In secure processor design, encrypting main memory is not sufficient for security because where and when memory is accessed reveals secret information. To this end, Ascend is equipped with a hardware Oblivious RAM (ORAM) controller, which obfuscates the address bus by reshuffling memory as it is accessed. To our knowledge, Ascend is the first prototyping of ORAM in custom silicon. Ascend has also been carefully engineered to ensure its timing behaviors are independent of user private data. In 32 nm silicon, all security components combined (the ORAM controller, which includes 12 AES rounds and one SHA-3 hash unit) impose a moderate area overhead of 0.51 mm$^2$2. Post tape-out, the security components of the Ascend chip have been successfully tested at 857 MHz and 1.1 V, at which point they consume 299 mW of power.
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.isversionof10.1109/TDSC.2017.2687463
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/
dc.sourceMIT web domain
dc.titleDesign and Implementation of the Ascend Secure Processor
dc.typeArticle
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.relation.journalIEEE Transactions on Dependable and Secure Computing
dc.eprint.versionAuthor's final manuscript
dc.type.urihttp://purl.org/eprint/type/JournalArticle
eprint.statushttp://purl.org/eprint/status/PeerReviewed
dc.date.updated2019-05-28T16:38:31Z
dspace.orderedauthorsRen, L; Fletcher, CW; Kwon, A; van Dijk, M; Devadas, S
dspace.date.submission2019-05-28T16:38:33Z
mit.journal.volume16
mit.journal.issue2
mit.metadata.statusAuthority Work and Publication Information Needed


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record