Hardware Security Is Hard: How Hardware Boundaries Define Platform Security.
Alex MatrosovPublished in: WOOT @ USENIX Security Symposium (2020)
Keyphrases
- real time
- random number generator
- low cost
- information security
- security requirements
- security issues
- computer security
- security mechanisms
- network security
- hardware and software
- hardware implementation
- security level
- trusted computing
- security systems
- security analysis
- protection scheme
- access control
- computing power
- security problems
- protection schemes
- massively parallel
- rfid tags
- statistical databases
- computing systems
- intrusion detection
- computer systems
- key management
- elliptic curve
- network management
- wireless sensor
- hardware architecture
- security threats
- smart card
- random number
- database systems