A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Vasilios MavroudisAndrea CerulliPetr SvendaDan CvrcekDusan KlinecGeorge DanezisPublished in: CCS (2017)
Keyphrases
- high assurance
- software systems
- operating system
- fault tolerant
- distributed systems
- access control
- software components
- low cost
- computer systems
- real time
- third party
- commercial off the shelf
- hardware and software
- security policies
- cooperative
- smart card
- building blocks
- hardware implementation
- computing systems
- image processing