Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically

Abstract

The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes have evolved, novel and potent hardware-based security threats are now possible. This paper presents a hybrid hardware/software approach to defending against malicious hardware. We… (More)
DOI: 10.1109/SP.2010.18
View Slides

Topics

Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Statistics

02040201020112012201320142015201620172018
Citations per Year

161 Citations

Semantic Scholar estimates that this publication has 161 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics