Title :
Magic boxes and boots: security in hardware
Author_Institution :
Dept. of Comput. Sci., Dartmouth Coll., Hanover, NH, USA
Abstract :
Computer users tend to think of computation - even the globally distributed computation that constitutes the Internet - in terms of what we see: the browser user interface, the text editor, the Gnome or OS X or Windows desktop. Similarly, we tend to think of computer security problems solely in terms of what users see: the application software, perhaps the OS underneath it, or perhaps even the "end to end" environment from one application installation to another. We discuss how hardware can be used to change the security game. From a security perspective, the first idea that comes to mind is to add a "magic box" to the computer - one that can hide secrets and computation even from an adversary with direct physical access.
Keywords :
Internet; computer bootstrapping; computer crime; coprocessors; data privacy; Gnome desktop; Internet; OS X desktop; Windows desktop; application installation; application software; browser user interface; computer security problems; distributed computing; hardware security; magic boxes; text editor; Application software; Consumer electronics; Coprocessors; Cryptography; Data security; Hardware; History; Information security; Privacy; Protection;
DOI :
10.1109/MC.2004.170