Hardware enhanced security

Ruby Bei-Loh Lee, Simha Sethumadhavan, G. Edward Suh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself. This tutorial presents some of these hardware-enhanced security techniques to the security community.

Original languageEnglish (US)
Title of host publicationCCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Number of pages1
DOIs
StatePublished - Nov 26 2012
Event2012 ACM Conference on Computer and Communications Security, CCS 2012 - Raleigh, NC, United States
Duration: Oct 16 2012Oct 18 2012

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other2012 ACM Conference on Computer and Communications Security, CCS 2012
CountryUnited States
CityRaleigh, NC
Period10/16/1210/18/12

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Hardware enhanced security'. Together they form a unique fingerprint.

Cite this