Security basics for computer architects

Ruby B. Lee

Research output: Chapter in Book/Report/Conference proceedingChapter

12 Scopus citations


Download Free Sample Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures. The book is also written to be accessible to a more general audience interested in the basic security technologies that can be used to improve cyber security. By understanding the concepts behind the security terminology, the interested reader would understand more clearly the frequent security breaches being reported in the news and be able to critique or even help propose effective security solutions.

Original languageEnglish (US)
Title of host publicationSecurity Basics for Computer Architects
Number of pages111
StatePublished - 2013

Publication series

NameSynthesis Lectures on Computer Architecture
ISSN (Print)1935-3235
ISSN (Electronic)1935-3243

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture


  • Access control
  • Computer security
  • Confidentiality and integrity
  • Cryptography
  • Hardware security
  • Secure processors
  • Secure protocols
  • Security policies
  • Trustworthy computing


Dive into the research topics of 'Security basics for computer architects'. Together they form a unique fingerprint.

Cite this