On the Integration of Physically Unclonable Functions into ARM TrustZone Security Technology.
Callum AitchisonRoman BuckleAlvin Ch'ngChristian ClarkeJacob MalleyBasel HalakPublished in: ECCTD (2020)
Keyphrases
- access control
- data encryption
- data processing
- intrusion detection
- cost effective
- information security
- rapid development
- key technologies
- security mechanisms
- information processing systems
- radio frequency identification rfid
- enterprise wide
- security threats
- personal computer
- security problems
- security level
- information systems
- security requirements
- security architecture
- digital rights management
- network security
- heterogeneous platforms