Demonstrating end point security in embedded systems

  • Patrick Schaumont
  • Eric Simpson
  • Pengyuan Yu
Part of the Integrated Circuits and Systems book series (ICIR)


This chapter describes a demonstrator for end-point security in a video peripheral. The demonstrator enables a third party to securely display a message, stored on a compact flash card, on a video monitor attached to the system. The message is personalized to a specific instance of the display platform and cannot be copied, modified, or cloned. The message is only decoded just before rendering the message on the video display. The chapter describes architectural enhancements to hardware and software to implement end-point security. The resulting system effectively implements a secure ’tunnel’: a trusted path from the compact flash memory up to the pins of the VGA connector. The chapter also presents a suitable security protocol to support end-point security services, and it presents a design methodology to implement this concept.


Advance Encryption Standard Stream Cipher Online Phase Video Messaging Secure Video 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    A. Bylund, “Apple’s DRM cracked again,”–7619.html, 2006.
  2. 2.
    A. Huang, “Keeping secrets in hardware: the Microsoft Xbox (TM) case study,” Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), 13–15.Google Scholar
  3. 3.
    E. Charbon, I. Tounoglu, “On intellectual property protection,” Proceedings 2001 IEEE Custom Integrated Circuits Conference, 517–523.Google Scholar
  4. 4.
    W. Shi, H. S. Lee, R. M. Yoo, A. Boldyreva, “A digital rights enabled graphics processing system,” Proceedings of the 21st ACM SIGGRAPH symposium on Graphics Hardware, 2006.Google Scholar
  5. 5.
    R. Thibadeau, “Trusted computing for disk drives and other peripherals,” IEEE Security and Privacy Magazine, 4(5):26–33, September 2006.CrossRefGoogle Scholar
  6. 6.
    I. Arce, “Bad Peripherals,” IEEE Security and Privacy Magazine, 3(1):70–73, 2005.CrossRefGoogle Scholar
  7. 7.
    R. Anderson, “Security engineering,” Wiley, 2001.Google Scholar
  8. 8.
    E. Gallery, “An overview of trusted computing technology,” in C. Mitchell, editor, “Trusted Computing,” IEE Professional Applications of Computing Series, 2005, IEE Press.Google Scholar
  9. 9.
    E. Simpson, P. Schaumont, “Offline hardware/software authentication for reconfigurable platforms,” Proceedings of Cryptographic Hardware and Embedded Systems Workshop (CHES 2006), 311–323.Google Scholar
  10. 10.
    C. D. Canniere, B. Preneel, “Trivium Specifications,” ECRYPT eStream Phase 3, 2006.Google Scholar
  11. 11.
  12. 12.
    D. Lim, J. Lee, B. Gassend, E. Suh, M. Van Dijk, S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 13(10):1200–1205, October 2005.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.ECE DepartmentVirginia TechBlacksburgUSA

Personalised recommendations