Login / Signup
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems.
Xiaolong Guo
Raj Gautam Dutta
Yier Jin
Published in:
IEEE Trans. Inf. Forensics Secur. (2017)
Keyphrases
</>
computer systems
hardware software
hardware and software
trust evaluation
operating system
data processing
information systems
trust management
communication systems
computing systems
embedded systems
information processing systems
computer architecture
machine learning
data analysis
multi core processors