Abstract
In recent years, embedded systems have evolved rapidly and become ubiquitous as they are found in a large number of devices. At the same time, as a result of recent technological advancements and high demand of connectivity, such systems are particularly susceptible to security attacks. Software-based security solutions cannot provide complete protection and are relatively slow. On the other hand, hardware-assisted techniques improve execution time but still involve dedicated software modules. In this paper, we have proposed a hardware based mechanism to process sensitive information in complete isolation without requiring any software process. The proposed solution is evaluated for an image processing based authentication system and it has demonstrated negligible area, power consumption and performance overhead.
Original language | English |
---|---|
Title of host publication | 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics |
Publisher | IEEE |
Pages | 216-219 |
Number of pages | 4 |
ISBN (Print) | 9781479982295 |
DOIs | |
Publication status | Published - 9 Sept 2015 |
Event | 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics - Glasgow, United Kingdom Duration: 29 Jun 2015 → 2 Jul 2015 |
Conference
Conference | 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics |
---|---|
Abbreviated title | PRIME 2015 |
Country/Territory | United Kingdom |
City | Glasgow |
Period | 29/06/15 → 2/07/15 |
ASJC Scopus subject areas
- Electrical and Electronic Engineering