Processor Architecture for Trustworthy Computers
暂无分享,去创建一个
We propose that computer architects need to design more trustworthy computers that protect a user’s information, computations and communications from attacks by malicious adversaries. This is in addition to providing current engineering goals of higher performance, lower cost, lower power consumption and smaller footprint.
[1] Ruby B. Lee,et al. Enlisting Hardware Architecture to Thwart Malicious Code Injection , 2004, SPC.
[2] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[3] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[4] Ruby B. Lee,et al. Architecture for Protecting Critical Secrets in Microprocessors , 2005, ISCA 2005.