Matches in SemOpenAlex for { <https://semopenalex.org/work/W211671857> ?p ?o ?g. }
Showing items 1 to 75 of
75
with 100 items per page.
- W211671857 abstract "Abstract : Perhaps as a result of the increasing complexity of computing systems, we see too many security mechanisms (for embedded systems or any other system) focus on only one level. An example of his limitation is that the use of typesafe languages may eliminate certain classes of vulnerabilities but may come at a performance and usability cost and have been successfully compromised via light-bulb-induced memory errors. (Looking only at the language level also neglects how much of the underlying libraries, OS, and firmware may be written in very primitive languages, such as assembler.) One might even go out on a limb and say that we need a new kind of composition theorem: not between peer modules, but rather across layers and organizational boundaries. Security architectures to control code updates and to authenticate devices are based on cryptographic protocols. Best practices tell how to soundly engineer protocols from the primitives and key lengths that cryptographers deem secure. However, the security of these primitives are themselves based on assumptions. History has shown these assumptions don't always remain true as long as anticipated. Sending a self-protecting embedded system out into the cold, cruel world also often requires that the system itself be able to keep and use cryptographic secrets. Here again, history shows that keeping secrets is difficult. Among the reasons for is the fact Industry is open to designing and deploying hardware-based techniques to enhance security. Perhaps as a consequence of trying to adhere to Moore's Law, hardware vendors are now giving us more cores than we know what to do with and are desperately searching for applications, usage models, and a business case. This position gives us an opportunity to rethink what a CPU does and to see these changes happen in the real world." @default.
- W211671857 created "2016-06-24" @default.
- W211671857 creator A5028522239 @default.
- W211671857 date "2007-02-22" @default.
- W211671857 modified "2023-09-24" @default.
- W211671857 title "Hardware-Based Security: Trouble and Hope" @default.
- W211671857 hasPublicationYear "2007" @default.
- W211671857 type Work @default.
- W211671857 sameAs 211671857 @default.
- W211671857 citedByCount "0" @default.
- W211671857 crossrefType "journal-article" @default.
- W211671857 hasAuthorship W211671857A5028522239 @default.
- W211671857 hasConcept C103377522 @default.
- W211671857 hasConcept C107457646 @default.
- W211671857 hasConcept C111919701 @default.
- W211671857 hasConcept C114869243 @default.
- W211671857 hasConcept C120665830 @default.
- W211671857 hasConcept C121332964 @default.
- W211671857 hasConcept C15927051 @default.
- W211671857 hasConcept C170130773 @default.
- W211671857 hasConcept C178489894 @default.
- W211671857 hasConcept C184842701 @default.
- W211671857 hasConcept C192209626 @default.
- W211671857 hasConcept C26517878 @default.
- W211671857 hasConcept C33884865 @default.
- W211671857 hasConcept C38652104 @default.
- W211671857 hasConcept C41008148 @default.
- W211671857 hasConcept C67212190 @default.
- W211671857 hasConcept C79974875 @default.
- W211671857 hasConcept C9390403 @default.
- W211671857 hasConceptScore W211671857C103377522 @default.
- W211671857 hasConceptScore W211671857C107457646 @default.
- W211671857 hasConceptScore W211671857C111919701 @default.
- W211671857 hasConceptScore W211671857C114869243 @default.
- W211671857 hasConceptScore W211671857C120665830 @default.
- W211671857 hasConceptScore W211671857C121332964 @default.
- W211671857 hasConceptScore W211671857C15927051 @default.
- W211671857 hasConceptScore W211671857C170130773 @default.
- W211671857 hasConceptScore W211671857C178489894 @default.
- W211671857 hasConceptScore W211671857C184842701 @default.
- W211671857 hasConceptScore W211671857C192209626 @default.
- W211671857 hasConceptScore W211671857C26517878 @default.
- W211671857 hasConceptScore W211671857C33884865 @default.
- W211671857 hasConceptScore W211671857C38652104 @default.
- W211671857 hasConceptScore W211671857C41008148 @default.
- W211671857 hasConceptScore W211671857C67212190 @default.
- W211671857 hasConceptScore W211671857C79974875 @default.
- W211671857 hasConceptScore W211671857C9390403 @default.
- W211671857 hasLocation W2116718571 @default.
- W211671857 hasOpenAccess W211671857 @default.
- W211671857 hasPrimaryLocation W2116718571 @default.
- W211671857 hasRelatedWork W1505536579 @default.
- W211671857 hasRelatedWork W1576857586 @default.
- W211671857 hasRelatedWork W1585653237 @default.
- W211671857 hasRelatedWork W1970200579 @default.
- W211671857 hasRelatedWork W1998730758 @default.
- W211671857 hasRelatedWork W2016521958 @default.
- W211671857 hasRelatedWork W2029047759 @default.
- W211671857 hasRelatedWork W2052570212 @default.
- W211671857 hasRelatedWork W2053449198 @default.
- W211671857 hasRelatedWork W2056308755 @default.
- W211671857 hasRelatedWork W2149961673 @default.
- W211671857 hasRelatedWork W2154703933 @default.
- W211671857 hasRelatedWork W2231285323 @default.
- W211671857 hasRelatedWork W2483552902 @default.
- W211671857 hasRelatedWork W2545960051 @default.
- W211671857 hasRelatedWork W2740435595 @default.
- W211671857 hasRelatedWork W3000815589 @default.
- W211671857 hasRelatedWork W3184159821 @default.
- W211671857 hasRelatedWork W350298751 @default.
- W211671857 hasRelatedWork W2124021099 @default.
- W211671857 isParatext "false" @default.
- W211671857 isRetracted "false" @default.
- W211671857 magId "211671857" @default.
- W211671857 workType "article" @default.