SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing.
Deeksha DangwalMeghan CowanArmin AlaghiVincent T. LeeBrandon ReagenCaroline TrippelPublished in: HASP@MICRO (2020)
Keyphrases
- hardware software
- security requirements
- security issues
- protection schemes
- hardware and software
- trusted computing
- security mechanisms
- embedded systems
- security measures
- hardware design
- security protocols
- hw sw
- security patterns
- key management
- computer systems
- security level
- data encryption
- security analysis
- computing platform
- low cost
- security services
- access control
- data security
- information security
- security properties
- security management
- software architecture
- sensitive data
- windows xp
- software systems
- security architecture
- key exchange protocol
- electronic voting
- computer hardware
- previously mentioned
- key agreement protocol
- multi core processors
- user authentication
- security model
- authentication protocol
- computing systems
- design methodology
- cryptographic protocols
- hardware implementation
- key distribution
- security policies
- key exchange
- advanced encryption standard
- security vulnerabilities
- stream cipher
- software development
- provably secure
- secure communication
- mobile agent system
- high performance computing
- network security
- diffie hellman
- electronic payment
- field programmable gate array
- hardware platforms
- key agreement
- privacy protection
- blue gene
- integrity verification
- operating system
- public key encryption