Show simple item record

dc.contributor.authorCostan, Victor Marius
dc.contributor.authorDevadas, Srinivas
dc.date.accessioned2012-09-24T15:02:18Z
dc.date.available2012-09-24T15:02:18Z
dc.date.issued2011-06
dc.date.submitted2011-07
dc.identifier.isbn978-1-4577-1059-9
dc.identifier.urihttp://hdl.handle.net/1721.1/73116
dc.description.abstractWe present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and low cost that make cloud computing attractive in the first place. We propose augmenting regular cloud servers with a Trusted Computation Base (TCB) that can securely perform high-performance computations. Our TCB achieves cost savings by spreading functionality across two paired chips. We show that making a Field-Programmable Gate Array (FPGA) a part of the TCB benefits security and performance, and we explore a new method for defending the computation inside the TCB against side-channel attacks.en_US
dc.description.sponsorshipNorthrop Grumman Corporationen_US
dc.description.sponsorshipQuanta Computer (Firm)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/HST.2011.5954986en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleSecurity challenges and opportunities in adaptive and reconfigurable hardwareen_US
dc.typeArticleen_US
dc.identifier.citationCostan, Victor, and Srinivas Devadas. “Security Challenges and Opportunities in Adaptive and Reconfigurable Hardware.” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2011. 1–5.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorCostan, Victor Marius
dc.contributor.mitauthorDevadas, Srinivas
dc.relation.journalProceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2011en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsCostan, Victor; Devadas, Srinivasen
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
dc.identifier.orcidhttps://orcid.org/0000-0002-7770-1273
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record