TY - GEN
T1 - HotChips security tutorial
AU - Lee, Ruby B.
AU - Chandra, Vikas
AU - Van Doorn, Leendert
AU - Durham, David
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/5/25
Y1 - 2014/5/25
N2 - Summary form only given. The complete presentation was not made available for publication as part of the conference proceedings. Cyber Security is becoming increasing important, as our daily lives, financial compeFFveness and naFonal security all depend on cyberspace interacFons. Software-only security soluFons oJen insufficient to stem aNacks, or they degrade performance. Hardware support for security has not been sufficiently uFlized - HW may be able to improve security significantly, without degrading performance. Hardware chip vendors are puRng increasing emphasis on security features, which we survey in this tutorial.
AB - Summary form only given. The complete presentation was not made available for publication as part of the conference proceedings. Cyber Security is becoming increasing important, as our daily lives, financial compeFFveness and naFonal security all depend on cyberspace interacFons. Software-only security soluFons oJen insufficient to stem aNacks, or they degrade performance. Hardware support for security has not been sufficiently uFlized - HW may be able to improve security significantly, without degrading performance. Hardware chip vendors are puRng increasing emphasis on security features, which we survey in this tutorial.
UR - http://www.scopus.com/inward/record.url?scp=84982798285&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84982798285&partnerID=8YFLogxK
U2 - 10.1109/HOTCHIPS.2014.7478794
DO - 10.1109/HOTCHIPS.2014.7478794
M3 - Conference contribution
AN - SCOPUS:84982798285
T3 - 2014 IEEE Hot Chips 26 Symposium, HCS 2014
BT - 2014 IEEE Hot Chips 26 Symposium, HCS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th IEEE Hot Chips Symposium, HCS 2014
Y2 - 10 August 2014 through 12 August 2014
ER -