Skip to main content
Video s3
    Details
    Presenter(s)
    Trong-Thuc Hoang Headshot
    Display Name
    Trong-Thuc Hoang
    Affiliation
    Affiliation
    University of Electro-Communications
    Country
    Abstract

    The trusted execution environment protects data by taking advantage of memory isolation schemes. Most of the software implementations on security enclaves offers a framework which can be implemented on any processor architecture. Assuming that privilege escalation is not possible through software means, the only way to access protected data is over authentication over a driver in kernel mode. In this work, a proposal of crypto-accelerator is described. This peripheral features a write-only secure memory that, and the cryptography operations can only read the data stored. This approach suppresses any cache coherence manipulator, and fault execution-related attacks against reading sensitive data. The peripheral can be useful to accelerate the cryptographic operations, and store securely intermediate calculations as well as storing secure keys. The time of execution compared to the software counterpart can be reduced down to 2.5 decades, and the throughput is risen to 3 decades, reaching speeds of 30MB/s for large chunks of data. The total area represents 10.7% of the total area of a dual-core RISC-V processor with RV64IMAFC extensions and tilelink buses.

    Slides