Where Does Security Stand? New Vulnerabilities vs. Trusted Computing
暂无分享,去创建一个
How can we ensure that platform hardware, firmware, and software work in concert to withstand rapidly evolving security threats? Architectural innovations bring performance gains but can also create new security vulnerabilities. In this panel discussion, from the 2007 workshop on Computer Architecture Research directions, we assess the current state of security and discuss possible routes toward trusted computing.
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] Jean-Pierre Seifert,et al. New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures , 2007, IMACC.
[3] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[4] Jean-Pierre Seifert,et al. Micro-Architectural Cryptanalysis , 2007, IEEE Security & Privacy.
[5] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .