Title
Hardware enhanced security
Abstract
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself. This tutorial presents some of these hardware-enhanced security techniques to the security community.
Year
DOI
Venue
2012
10.1145/2382196.2382323
ACM Conference on Computer and Communications Security
Keywords
Field
DocType
hardware-enhanced security technique,secure computing system,hardware community,software layer,lower layer software,hardware strength,hardware enhanced security,significant effort,careful coordination,security community,higher layer protection mechanism,side channel attacks,hardware security,puf
Computer security compromised by hardware failure,Hardware Trojan,Hardware security module,Hardware compatibility list,Computer security,Software security assurance,Computer science,Hardware acceleration,Tamper resistance,Computer hardware,Hardware architecture,Embedded system
Conference
Citations 
PageRank 
References 
0
0.34
1
Authors
3
Name
Order
Citations
PageRank
Ruby Lee12460261.28
Simha Sethumadhavan292554.24
G. Edward Suh32721208.03