The early experimental work suggested the utility of a a secure coprocessor platform as a generic product that enables development and deployment of TCP applications. This chapter discusses the design challenges and tradeoffs we faced, in the mid-1990s, when trying to transform this notion into a real product. Section 5.1 sets the context for this project. Section 5.2 discusses the design obstacles we faced. Section 5.3 boils down this analysis into a set of requirements for a product. Section 5.4 sketches the technology we developed to help overcome these obstacles, and some usage scenarios this technology might enable.
KeywordsComputing Platform Application Developer Design Challenge Safe Haven Physical Security
Unable to display preview. Download preview PDF.
- [SPW98]S.W. Smith, E. Palmer, and S. Weingart. Using a High-Performance, Pro-grammable Secure Coprocessor. In Financial Cryptography, Second International Conference, FC’98, pages 73–89. Springer-Verlag LNCS 1465, 1998.Google Scholar
- [DPSL99]J. Dyer, R. Perez, S.W. Smith, and M. Lindemann. Application Support Architecture for a High-Performance, Programmable Secure Coprocessor. In 22nd National Information Systems Security Conference, October 1999.Google Scholar
- [DLP+01]J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L.van Doom, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 34:57–66, 2001.Google Scholar