Hardware enhanced security

Ruby Lee, Simha Sethumadhavan, G. Edward Suh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself. This tutorial presents some of these hardware-enhanced security techniques to the security community.

Original languageEnglish (US)
Title of host publicationCCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Pages1052
Number of pages1
DOIs
StatePublished - 2012
Event2012 ACM Conference on Computer and Communications Security, CCS 2012 - Raleigh, NC, United States
Duration: Oct 16 2012Oct 18 2012

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other2012 ACM Conference on Computer and Communications Security, CCS 2012
Country/TerritoryUnited States
CityRaleigh, NC
Period10/16/1210/18/12

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Keywords

  • Hardware Trojan
  • Hardware security
  • PUF
  • Secure cloud computing
  • Secure processors
  • Side channel attacks

Fingerprint

Dive into the research topics of 'Hardware enhanced security'. Together they form a unique fingerprint.

Cite this