A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Vasilios MavroudisAndrea CerulliPetr SvendaDan CvrcekDusan KlinecGeorge DanezisPublished in: CoRR (2017)
Keyphrases
- high assurance
- software systems
- operating system
- fault tolerant
- access control
- distributed systems
- software components
- low cost
- hardware and software
- real time
- security policies
- third party
- computer systems
- software engineering
- building blocks
- privacy preserving
- embedded systems
- case study
- image processing
- database
- real world
- smart card
- software development
- personal computer
- computing systems
- hardware architecture
- commercial off the shelf
- random number generator