SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing.
Deeksha DangwalMeghan CowanArmin AlaghiVincent T. LeeBrandon ReagenCaroline TrippelPublished in: CoRR (2021)
Keyphrases
- hardware software
- security requirements
- hardware and software
- security issues
- protection schemes
- trusted computing
- security level
- embedded systems
- data encryption
- computing platform
- hardware design
- security measures
- low cost
- security management
- security patterns
- security mechanisms
- computer systems
- security properties
- key management
- hw sw
- security protocols
- authentication protocol
- security analysis
- security services
- key agreement protocol
- hardware platforms
- windows xp
- previously mentioned
- electronic voting
- information security
- key exchange
- software architecture
- key agreement
- advanced encryption standard
- sensitive data
- user authentication
- cryptographic protocols
- software development
- security architecture
- authentication mechanism
- protection scheme
- key exchange protocol
- access control
- software systems
- smart card
- encryption scheme
- intrusion detection
- key distribution
- security model
- application level
- data security
- network security
- security policies
- security vulnerabilities
- design methodology
- secret key
- stream cipher
- public key encryption
- field programmable gate array
- diffie hellman
- computer hardware
- authentication scheme
- identity management
- computing systems
- computer security
- ad hoc networks
- operating system
- integrity verification
- private key
- secure communication