Abstract | ||
---|---|---|
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself. This tutorial presents some of these hardware-enhanced security techniques to the security community. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1145/2382196.2382323 | ACM Conference on Computer and Communications Security |
Keywords | Field | DocType |
hardware-enhanced security technique,secure computing system,hardware community,software layer,lower layer software,hardware strength,hardware enhanced security,significant effort,careful coordination,security community,higher layer protection mechanism,side channel attacks,hardware security,puf | Computer security compromised by hardware failure,Hardware Trojan,Hardware security module,Hardware compatibility list,Computer security,Software security assurance,Computer science,Hardware acceleration,Tamper resistance,Computer hardware,Hardware architecture,Embedded system | Conference |
Citations | PageRank | References |
0 | 0.34 | 1 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ruby Lee | 1 | 2460 | 261.28 |
Simha Sethumadhavan | 2 | 925 | 54.24 |
G. Edward Suh | 3 | 2721 | 208.03 |