Validating a high performance programmable secure coprocessor

Rated 4.39/5 based on 654 customer reviews

This paper details our experiences with successfully validating a trusted device at FIPS 140-1 Level 4---earning the world's first certificate at this highest level.

Successful validation at Level 4 required withstanding a fairly open-ended suite of physical attacks, and preparing formal modeling and verification of the internal software---as well as meeting a number of other sizable challenges that were not initially apparent.

For further information, including about cookie settings, please read our Cookie Policy .The use of multiplication greatly increases the diffusion achieved per round, allowing for greater security, fewer rounds, and increased throughput. This paper traces the subsequent dvelopment of the idea of a \“security kernel\” and of the mathmtical modeling of security, focusing in particular on the paradigmatic Bell La Padula model.The paper examines the connections between security and formal , deductiv verification of the properties of computer systems.To learn more or modify/prevent the use of cookies, see our Cookie Policy and Privacy Policy.Abstract Secure coprocessors enable secure distributed applications by providing safe havens where an application program can execute (and accumulate state), free of observation and interference by an adversary with direct physical access to the device.

Leave a Reply