Hardware Assurance: Trojans, Counterfeits, and Security in an Interconnected World.
Matthew J. CastoPublished in: ACM Great Lakes Symposium on VLSI (2018)
Keyphrases
- information security
- random number generator
- security issues
- low cost
- intrusion detection
- trusted computing
- hardware and software
- information assurance
- real time
- security level
- security threats
- security requirements
- information systems
- world model
- security protocols
- computer security
- smart card
- computing power
- security problems
- computer systems
- random number
- hardware implementation
- security policies
- key management
- security systems
- application level
- computing systems
- hardware architecture
- security management
- security measures
- elliptic curve
- security mechanisms
- data encryption
- security analysis