Publications

Trustworthy Commodity Computing and Communication

Abstract

• Build security into computers from the hardware up• Hardware trust anchors to tether and protect trusted applications software, without relying on commodity OS• Software-Hardware Trusted Computing Base with Separation Kernel, Trusted OS, Trusted Path Application• Architectural mitigation of covert and side channels• Clean-slate architectural design• Deployable solutions for commodity computers

Date
March 16, 2008
Authors
Ruby B Lee, Cynthia Irvine, Terry Benzel, Mung Chiang