%0 Conference Paper %B Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on %D 2008 %T Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems %A Taylor,M. %A Yin,Chi-En %A M. Wu %A Gang Qu %K arrays;invasive %K attacks;mobile %K codes;data %K codes;mobile %K computing; %K computing;power %K consumption;proof-of-the-concept %K count;gate %K data %K delay;hardware-assisted %K embedding;gate %K embedding;instruction-block %K encapsulation;distributed %K execution %K FPGA %K gate %K hiding;information %K injection;binary %K level;malicious %K programmable %K programming;field %K prototyping;secure %K software;mobile %K systems;binary %K Trojan %X Recently, a novel data hiding technique was proposed to embed information into compiled binary codes in order to enhance system performance. Using this technique as a vehicle, we propose a framework to build high-performance secure execution systems by embedding data for security and trust purposes. We illustrate this approach in a mobile computing environment by an instruction-block level data hiding technique, which can be used to defend against malicious attacks (such as Trojan injection). This improves the trustworthiness of mobile codes. It also protects the code providerpsilas intellectual property because the code can be executed only on the designated device. When combined with the existing approach in [4], the proposed data hiding framework can provide trust and high-performance simultaneously. Finally, we conduct a proof-of-the-concept FPGA prototyping to validate the data hiding technique and evaluate the hardware cost in terms of gate count, power consumption, and gate delay. %B Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on %P 93 - 96 %8 2008/06// %G eng %R 10.1109/HST.2008.4559062