DocumentCode :
1147307
Title :
Magic boxes and boots: security in hardware
Author :
Smith, Sean
Author_Institution :
Dept. of Comput. Sci., Dartmouth Coll., Hanover, NH, USA
Volume :
37
Issue :
10
fYear :
2004
Firstpage :
106
Lastpage :
109
Abstract :
Computer users tend to think of computation - even the globally distributed computation that constitutes the Internet - in terms of what we see: the browser user interface, the text editor, the Gnome or OS X or Windows desktop. Similarly, we tend to think of computer security problems solely in terms of what users see: the application software, perhaps the OS underneath it, or perhaps even the "end to end" environment from one application installation to another. We discuss how hardware can be used to change the security game. From a security perspective, the first idea that comes to mind is to add a "magic box" to the computer - one that can hide secrets and computation even from an adversary with direct physical access.
Keywords :
Internet; computer bootstrapping; computer crime; coprocessors; data privacy; Gnome desktop; Internet; OS X desktop; Windows desktop; application installation; application software; browser user interface; computer security problems; distributed computing; hardware security; magic boxes; text editor; Application software; Consumer electronics; Coprocessors; Cryptography; Data security; Hardware; History; Information security; Privacy; Protection;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2004.170
Filename :
1350739
Link To Document :
بازگشت