Hardware security in practice: Challenges and opportunities

@article{Potlapally2011HardwareSI,
  title={Hardware security in practice: Challenges and opportunities},
  author={Nachiketh R. Potlapally},
  journal={2011 IEEE International Symposium on Hardware-Oriented Security and Trust},
  year={2011},
  pages={93-98}
}
Computing platforms used in practice are complex and require interaction between multiple hardware components (such as processor, chipset, memory and peripherals) for their normal operation. Maintaining security of these computing platforms translates to verifying there are no known security exploits present in the run-time interaction between these hardware units which can be exploited by attackers. However, given the large number of state elements in the hardware units and many control… CONTINUE READING
9 Citations
14 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 14 references

PS3 epic fail

  • Fail0verflow
  • 27 Chaos Comm. Congress (CCC), Dec 2010.
  • 2010
Highly Influential
3 Excerpts

High-level formal modeling-based approach for architectural security validation

  • N. Potlapally
  • Proc. Intel Design & Test Tech. Conf. (DTTC), Aug…
  • 2010
2 Excerpts

W32.Stuxnet Dossier

  • N.Falliere, L. Murchu, E. Chien
  • Symantec Security Response, Nov 2010.
  • 2010
1 Excerpt

Getting into SMRAM: SMM Reloaded

  • L. Duflot, O. Levillain, B. Morin, O. Grumelard
  • CanSecWest Conf., March 2009.
  • 2009
2 Excerpts

Introducing ring -3 rootkits

  • A. Tereshkin, R. Wojtczuk
  • Black Hat Conf., July 2009.
  • 2009
1 Excerpt

On the security of vPro: ME stack analysis and best practices

  • R. Kannavara, S. Mandujano, N. Potlapally
  • Proc. Intel Design & Test Tech. Conf. (DTTC), Aug…
  • 2009
1 Excerpt

Xen 0wning trilogy

  • R. Wojtczuk, J. Rutkowska, A. Tereshkin
  • Black Hat Conf., Oct 2008.
  • 2008
2 Excerpts

Security issues related to Pentium System Management Mode

  • L. Duflot
  • CanSecWest Conf., March 2006.
  • 2006
1 Excerpt

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

  • M. Dowd, J. McDonald, J. Schuh
  • Addison-Welsey,
  • 2006
1 Excerpt

Similar Papers

Loading similar papers…