Specifying and Verifying Hardware for Tamper-Resistant Software.
David LieJohn C. MitchellChandramohan A. ThekkathMark HorowitzPublished in: IEEE Symposium on Security and Privacy (2003)
Keyphrases
- computer systems
- hardware design
- hardware and software
- software implementation
- embedded systems
- low cost
- blue gene
- high end
- hardware platforms
- software tools
- hardware software
- software systems
- personal computer
- hardware implementation
- dedicated hardware
- computer hardware
- real time
- software design
- computing platform
- software development
- industry standard
- commercial off the shelf
- control software
- hardware designs
- abstraction layer
- vlsi implementation
- computing power
- computing systems
- software maintenance
- software architecture
- source code
- artificial intelligence
- data sets