Publications
Trustworthy Commodity Computing and Communication
Abstract
• Build security into computers from the hardware up• Hardware trust anchors to tether and protect trusted applications software, without relying on commodity OS• Software-Hardware Trusted Computing Base with Separation Kernel, Trusted OS, Trusted Path Application• Architectural mitigation of covert and side channels• Clean-slate architectural design• Deployable solutions for commodity computers
- Date
- March 16, 2008
- Authors
- Ruby B Lee, Cynthia Irvine, Terry Benzel, Mung Chiang