• DocumentCode
    1045490
  • Title

    Where Does Security Stand? New Vulnerabilities vs. Trusted Computing

  • Author

    Gueron, Shay ; Stronqin, G. ; Seifert, Jean-Pierre ; Chiou, Derek ; Sendag, Resit ; Yi, Joshua J.

  • Author_Institution
    Univ. of Haifa & Intel Corp., Haifa
  • Volume
    27
  • Issue
    6
  • fYear
    2007
  • Firstpage
    25
  • Lastpage
    35
  • Abstract
    How can we ensure that platform hardware, firmware, and software work in concert to withstand rapidly evolving security threats? Architectural innovations bring performance gains but can also create new security vulnerabilities. In this panel discussion, from the 2007 workshop on Computer Architecture Research directions, we assess the current state of security and discuss possible routes toward trusted computing.
  • Keywords
    computer architecture; firmware; security of data; computer architectural innovation; platform firmware; platform hardware; platform software; security threat; security vulnerability; trusted computing; Application software; Computer architecture; Computer security; Costs; Hardware; Information security; Microarchitecture; Microprogramming; Pipelines; Technological innovation; computer systems organization; emerging technologies; microarchitecture implementation considerations; operating systems; processor architectures; security and privacy protection; software/software engineering;
  • fLanguage
    English
  • Journal_Title
    Micro, IEEE
  • Publisher
    ieee
  • ISSN
    0272-1732
  • Type

    jour

  • DOI
    10.1109/MM.2007.112
  • Filename
    4437717