Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically


The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes have evolved, novel and potent hardware-based security threats are now possible. This paper presents a hybrid hardware/software approach to defending against malicious hardware. We… (More)
DOI: 10.1109/SP.2010.18
View Slides


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.


Citations per Year

161 Citations

Semantic Scholar estimates that this publication has 161 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics