作者: Tao Liu , Hui Guo , Sri Parameswaran , Sharon X. Hu
DOI: 10.1016/J.VLSI.2016.10.006
关键词: Set (abstract data type) 、 Authentication 、 Space (commercial competition) 、 Adversary 、 Value (computer science) 、 Data integrity 、 Flexibility (engineering) 、 Embedded system 、 Vulnerability (computing) 、 Computer science
摘要: Abstract Security becomes increasingly important in computing systems. Data integrity is of utmost importance. One way to protect data attaching an identifying tag individual data. The authenticity the can then be checked against its tag. If altered by adversary, related invalid and attack will detected. work presented this paper studies existing design (CETD) for authenticating memory embedded processor systems, where that are stored or transferred over bus tampered. Compared other designs, offers flexibility trading-off between implementation cost size (hence level security); effective counter with random values (namely fake used replace valid random). However, we find vulnerable when not randomly selected. For some data, their tags distributed full value space but rather limited a much reduced set values. When those were chosen as value, alteration would likely go undetected. In article, analytically investigate problem propose low enhancement ensure full-range distribution each hence effectively removing vulnerability original design.