Architecture for Protecting Critical Secrets in Microprocessors
نویسندگان
چکیده
منابع مشابه
Protecting Trade Secrets in Canada.
Patents in the life sciences industries are a key form of intellectual property (IP), particularly for products such as brand-name drugs and medical devices. However, trade secrets can also be a useful tool for many types of innovations. In appropriate cases, trade secrets can offer long-term protection of IP for a lower financial cost than patenting. This type of protection must be approached ...
متن کاملProtecting Cryptographic Secrets and Processes
Modern commodity operating systems are increasingly used to perform cryptographic operations such as digital signatures and to store cryptographic keys and data which the user considers private. Even when this data is encrypted, as is the recommended best practice, the encryption keys themselves are not wellprotected. We examine the problem of protecting cryptographic secrets and cryptographic ...
متن کاملA security architecture for microprocessors
The Security Architecture for Microprocessors (SAM ) is a lightweight and high-performance combined hardand software security extension for microprocessors. SAM has been designed to provide a secure remote code execution environment. It can be used to implement effective copy-protection schemes and provides mechanisms to prevent data and algorithm disclosure. SAM provides protection even if an ...
متن کاملThe emanation of consolidated secrets in Islamic architecture
Islamic architecture has a fundamental dignity and tries to preserve the spiritual and immortal elements. The most sensible characteristic of this type of art is the compatibility with the nature of Islam; monotheism, which the mosque architecture provides the best bed for such purpose. The main model for constructing mosques, from both outward and internal spiritual truths point of view, is th...
متن کاملProtecting Poorly Chosen Secrets from Guessing Attacks
In a security system that allows people to choose their own passwords those people tend to choose passwords that can be easily guessed This weakness exists in practically all widely used systems Instead of forcing users to choose well chosen secrets which are likely to be di cult to remember we propose solutions that maintain both user convenience and a high level of security at the same time T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGARCH Computer Architecture News
سال: 2005
ISSN: 0163-5964
DOI: 10.1145/1080695.1069971