Picture of boy being examining by doctor at a tuberculosis sanatorium

Understanding our future through Open Access research about our past...

Strathprints makes available scholarly Open Access content by researchers in the Centre for the Social History of Health & Healthcare (CSHHH), based within the School of Humanities, and considered Scotland's leading centre for the history of health and medicine.

Research at CSHHH explores the modern world since 1800 in locations as diverse as the UK, Asia, Africa, North America, and Europe. Areas of specialism include contraception and sexuality; family health and medical services; occupational health and medicine; disability; the history of psychiatry; conflict and warfare; and, drugs, pharmaceuticals and intoxicants.

Explore the Open Access research of the Centre for the Social History of Health and Healthcare. Or explore all of Strathclyde's Open Access research...

Image: Heart of England NHS Foundation Trust. Wellcome Collection - CC-BY.

Improving resilience by deploying permuted code onto physically unclonable unique processors

Aßmuth, Andreas and Cockshott, Paul and Kipke, Jana and Renaud, Karen and Mackenzie, Lewis and Vanderbauwhede, Wim and Söllner, Matthias and Fischer, Tilo and Weir, George (2016) Improving resilience by deploying permuted code onto physically unclonable unique processors. In: 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, Piscataway, pp. 144-150. ISBN 9781509026579

[img]
Preview
Text (Assmuth-etal-CCC2016-Improving-resilience-by-deploying-permuted-code)
Assmuth_etal_CCC2016_Improving_resilience_by_deploying_permuted_code.pdf
Accepted Author Manuscript

Download (228kB) | Preview

Abstract

Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they are homogenous and interconnected. Mitigating solutions are urgently required because systems breaches can feasibly lead to fatalities. In this paper we propose the deployment of permuted code onto Physically Unclonable Unique Processors in order to resist common cyber attacks. We present our proposal and explain how it would resist attacks from hostile agents.