Defining and enforcing hardware security requirements

  title={Defining and enforcing hardware security requirements},
  author={Michael Bilzor},
Abstract : Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's… CONTINUE READING

Figures, Tables, and Topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.


Publications referenced by this paper.

Overcoming an Untrusted CompuTng Base: DetecTng and Removing Malicious Hardware AutomaTcally,

  • Hicks, Finnicum, King, MarTn, Smith
  • Proceedings of the 31st IEEE Symposium on…
  • 2010

Security Checkers: DetecTng Processor Malicious Inclusions at RunTme,

  • M. Bilzor, T. Huffmire, C. Irvine, T. Levin
  • IEEE InternaTonal Symposium on Hardware…
  • 2010