DocumentCode :
26645
Title :
Rethinking Computers for Cybersecurity
Author :
Lee, Ruby B.
Author_Institution :
Princeton Univ., Princeton, NJ, USA
Volume :
48
Issue :
4
fYear :
2015
fDate :
Apr. 2015
Firstpage :
16
Lastpage :
25
Abstract :
Cyberattacks are growing at an alarming rate, even as our dependence on cyberspace transactions increases. Our software security solutions may no longer be sufficient. It is time to rethink computer design from the foundations. Can hardware security be enlisted to improve cybersecurity? The author discusses two classes of hardware security: hardware-enhanced security architectures for improving software and system security, and secure hardware. The Web extra at https://youtu.be/z-c9ACviGNo is a video of a 2006 invited seminar at the Naval Postgraduate School, in which author Ruby B. Lee presents the Secret-Protected (SP) architecture, which is a minimalist set of hardware features that can be added to any microprocessor or embedded processor that protects the "master secrets" that in turn protect other keys and encrypted information, programs and data.
Keywords :
security of data; computer design; cybersecurity; cyberspace transactions; hardware security; hardware-enhanced security architectures; software security improvement; system security improvement; Access control; Computer architecture; Computer crime; Computer security; Cryptography; Cloud; SaaS; computer architecture; cryptography; data access control; hackers; secure caches; security; self-protecting data; trusted software;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2015.118
Filename :
7085648
Link To Document :
بازگشت