DocumentCode
26645
Title
Rethinking Computers for Cybersecurity
Author
Lee, Ruby B.
Author_Institution
Princeton Univ., Princeton, NJ, USA
Volume
48
Issue
4
fYear
2015
fDate
Apr. 2015
Firstpage
16
Lastpage
25
Abstract
Cyberattacks are growing at an alarming rate, even as our dependence on cyberspace transactions increases. Our software security solutions may no longer be sufficient. It is time to rethink computer design from the foundations. Can hardware security be enlisted to improve cybersecurity? The author discusses two classes of hardware security: hardware-enhanced security architectures for improving software and system security, and secure hardware. The Web extra at https://youtu.be/z-c9ACviGNo is a video of a 2006 invited seminar at the Naval Postgraduate School, in which author Ruby B. Lee presents the Secret-Protected (SP) architecture, which is a minimalist set of hardware features that can be added to any microprocessor or embedded processor that protects the "master secrets" that in turn protect other keys and encrypted information, programs and data.
Keywords
security of data; computer design; cybersecurity; cyberspace transactions; hardware security; hardware-enhanced security architectures; software security improvement; system security improvement; Access control; Computer architecture; Computer crime; Computer security; Cryptography; Cloud; SaaS; computer architecture; cryptography; data access control; hackers; secure caches; security; self-protecting data; trusted software;
fLanguage
English
Journal_Title
Computer
Publisher
ieee
ISSN
0018-9162
Type
jour
DOI
10.1109/MC.2015.118
Filename
7085648
Link To Document