Defining and enforcing hardware security requirements

@inproceedings{Bilzor2011DefiningAE,
  title={Defining and enforcing hardware security requirements},
  author={Michael Bilzor},
  year={2011}
}
Abstract : Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's… CONTINUE READING

Figures, Tables, and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

Overcoming an Untrusted CompuTng Base: DetecTng and Removing Malicious Hardware AutomaTcally,

  • Hicks, Finnicum, King, MarTn, Smith
  • Proceedings of the 31st IEEE Symposium on…
  • 2010

Security Checkers: DetecTng Processor Malicious Inclusions at RunTme,

  • M. Bilzor, T. Huffmire, C. Irvine, T. Levin
  • IEEE InternaTonal Symposium on Hardware…
  • 2010