Abstract
This chapter describes a demonstrator for end-point security in a video peripheral. The demonstrator enables a third party to securely display a message, stored on a compact flash card, on a video monitor attached to the system. The message is personalized to a specific instance of the display platform and cannot be copied, modified, or cloned. The message is only decoded just before rendering the message on the video display. The chapter describes architectural enhancements to hardware and software to implement end-point security. The resulting system effectively implements a secure ’tunnel’: a trusted path from the compact flash memory up to the pins of the VGA connector. The chapter also presents a suitable security protocol to support end-point security services, and it presents a design methodology to implement this concept.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
A. Bylund, “Apple’s DRM cracked again,” http://arstechnica.com/news.ars/post/20060830–7619.html, 2006.
A. Huang, “Keeping secrets in hardware: the Microsoft Xbox (TM) case study,” Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), 13–15.
E. Charbon, I. Tounoglu, “On intellectual property protection,” Proceedings 2001 IEEE Custom Integrated Circuits Conference, 517–523.
W. Shi, H. S. Lee, R. M. Yoo, A. Boldyreva, “A digital rights enabled graphics processing system,” Proceedings of the 21st ACM SIGGRAPH symposium on Graphics Hardware, 2006.
R. Thibadeau, “Trusted computing for disk drives and other peripherals,” IEEE Security and Privacy Magazine, 4(5):26–33, September 2006.
I. Arce, “Bad Peripherals,” IEEE Security and Privacy Magazine, 3(1):70–73, 2005.
R. Anderson, “Security engineering,” Wiley, 2001.
E. Gallery, “An overview of trusted computing technology,” in C. Mitchell, editor, “Trusted Computing,” IEE Professional Applications of Computing Series, 2005, IEE Press.
E. Simpson, P. Schaumont, “Offline hardware/software authentication for reconfigurable platforms,” Proceedings of Cryptographic Hardware and Embedded Systems Workshop (CHES 2006), 311–323.
C. D. Canniere, B. Preneel, “Trivium Specifications,” ECRYPT eStream Phase 3, 2006.
GEZEL Homepage, http://rijndael.ece.vt.edu/gezel2
D. Lim, J. Lee, B. Gassend, E. Suh, M. Van Dijk, S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 13(10):1200–1205, October 2005.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Schaumont, P., Simpson, E., Yu, P. (2010). Demonstrating end point security in embedded systems. In: Verbauwhede, I. (eds) Secure Integrated Circuits and Systems. Integrated Circuits and Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71829-3_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-71829-3_11
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71827-9
Online ISBN: 978-0-387-71829-3
eBook Packages: EngineeringEngineering (R0)