Security Checkers: Detecting processor malicious inclusions at runtime.
Michael BilzorTed HuffmireCynthia E. IrvineTimothy E. LevinPublished in: HOST (2011)
Keyphrases
- malicious activities
- identity theft
- security issues
- malicious users
- information security
- malicious attacks
- access control
- intrusion detection
- intrusion detection system
- insider attacks
- security policies
- parallel processing
- high speed
- detecting malicious
- low cost
- windows xp
- malicious nodes
- detect malicious
- network security
- real time
- security threats
- security level
- computer security
- computer architecture
- security requirements
- rfid tags
- statistical databases