While hardware resources in the form of both transistors and full microprocessor cores are now abundant, economic factors prevent specialized hardware mechanisms required for secure processing from being integrated into commodity parts. We are exploring a novel way in which commodity hardware can be augmented after fabrication to enhance secure operation for only those systems that require it. Our methods will be applicable to a wide range of security problems, including the detection and isolation of hardware subversion and Trojan horses, cache-based side channels in chip multi-processors (CMPs), embedded systems security, and hardware intrusion detection and prevention. Utilizing off-the-shelf components to build trustworthy systems resu...
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns invo...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
While hardware resources in the form of both tran-sistors and full microprocessor cores are now abun...
Hardware resources are abundant; state-of-the-art processors have over one billion transistors. Yet ...
Hardware resources are abundant; state-of-the-art proces-sors have over one billion transistors. Yet...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
The increasing need for security has caused system designers to consider placing some security suppo...
Processing and storage of confidential or critical information is an every day occurrence in computi...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Computer security is a full-system property, and attackers will always go after the weakest link in ...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns invo...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
While hardware resources in the form of both tran-sistors and full microprocessor cores are now abun...
Hardware resources are abundant; state-of-the-art processors have over one billion transistors. Yet ...
Hardware resources are abundant; state-of-the-art proces-sors have over one billion transistors. Yet...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
The increasing need for security has caused system designers to consider placing some security suppo...
Processing and storage of confidential or critical information is an every day occurrence in computi...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Computer security is a full-system property, and attackers will always go after the weakest link in ...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns invo...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...