Loading…

Trustworthy hardware from untrusted components

This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.

Saved in:
Bibliographic Details
Published in:Communications of the ACM 2015-09, Vol.58 (9), p.60-71
Main Authors: Sethumadhavan, Simha, Waksman, Adam, Suozzo, Matthew, Huang, Yipeng, Eum, Julianna
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.
ISSN:0001-0782
1557-7317
DOI:10.1145/2699412