Improving resilience by deploying permuted code onto physically unclonable unique processors

Andreas Aßmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George Weir

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

73 Downloads (Pure)

Abstract

Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they are homogenous and interconnected. Mitigating solutions are urgently required because systems breaches can feasibly lead to fatalities. In this paper we propose the deployment of permuted code onto Physically Unclonable Unique Processors in order to resist common cyber attacks. We present our proposal and explain how it would resist attacks from hostile agents.

Original languageEnglish
Title of host publication2016 Cybersecurity and Cyberforensics Conference (CCC)
Place of PublicationPiscataway
PublisherIEEE
Pages144-150
Number of pages7
ISBN (Electronic)9781509026579
ISBN (Print)9781509026579
DOIs
Publication statusPublished - 20 Oct 2016
Event1st Cybersecurity and Cyberforensics Conference, CCC 2016 - Amman, Jordan
Duration: 2 Aug 20164 Aug 2016

Conference

Conference1st Cybersecurity and Cyberforensics Conference, CCC 2016
Country/TerritoryJordan
CityAmman
Period2/08/164/08/16

Keywords

  • hardware
  • cryptography
  • program processors
  • production
  • viruses
  • control systems
  • resists
  • data security
  • hostile agents
  • permuted code
  • industrial control systems

Fingerprint

Dive into the research topics of 'Improving resilience by deploying permuted code onto physically unclonable unique processors'. Together they form a unique fingerprint.

Cite this