College - Author 1

College of Engineering

Department - Author 1

Computer Engineering Department

College - Author 2

College of Engineering

Department - Author 2

Computer Science Department

College - Author 3

College of Engineering

Department - Author 3

Computer Science Department

Advisor

Stephen R. Beard (PI), College of Engineering Computer Science Dept.

Funding Source

Larry and Nancy Bergman

Date

10-2023

Abstract/Summary

All software security relies on proper execution at the hardware level. This research extends work on containment architectures, which ensure that any ill effects of malicious or buggy hardware are contained within the system. This is accomplished by a small, security hardware component, called the Sentry, validating communication before it leaves the system. This research assesses the advantages and disadvantages of using the CHISEL hardware language, from a security and verification standpoint. Further, this research investigates more efficient Merkle trees to optimization caching within the Sentry chip to improve performance and power utilization.

Share

COinS
 

URL: https://digitalcommons.calpoly.edu/ceng_surp/84

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.