The K2 Architecture for Trustworthy Hardware Security Modules.
Anish AthalyeM. Frans KaashoekNickolai ZeldovichJoseph TassarottiPublished in: KISV@SOSP (2023)
Keyphrases
- real time
- hardware architecture
- low cost
- software implementation
- application level
- hardware and software
- hardware implementation
- access control
- management system
- vlsi implementation
- hardware design
- trust management
- network security
- vlsi architecture
- hardware software
- random number generator
- network access
- hardware architectures
- pipeline architecture
- modular architecture
- security architecture
- host computer
- enterprise systems
- processing units
- security requirements
- information security
- intrusion detection
- computer systems
- parallel architecture
- field programmable gate array
- security mechanisms
- security issues
- statistical databases
- dedicated hardware
- software architecture
- trusted computing
- fpga technology
- information systems