Architecture for Protecting Critical Secrets in Microprocessors

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Trade Secrets in Canada.

Patents in the life sciences industries are a key form of intellectual property (IP), particularly for products such as brand-name drugs and medical devices. However, trade secrets can also be a useful tool for many types of innovations. In appropriate cases, trade secrets can offer long-term protection of IP for a lower financial cost than patenting. This type of protection must be approached ...

متن کامل

Protecting Cryptographic Secrets and Processes

Modern commodity operating systems are increasingly used to perform cryptographic operations such as digital signatures and to store cryptographic keys and data which the user considers private. Even when this data is encrypted, as is the recommended best practice, the encryption keys themselves are not wellprotected. We examine the problem of protecting cryptographic secrets and cryptographic ...

متن کامل

A security architecture for microprocessors

The Security Architecture for Microprocessors (SAM ) is a lightweight and high-performance combined hardand software security extension for microprocessors. SAM has been designed to provide a secure remote code execution environment. It can be used to implement effective copy-protection schemes and provides mechanisms to prevent data and algorithm disclosure. SAM provides protection even if an ...

متن کامل

The emanation of consolidated secrets in Islamic architecture

Islamic architecture has a fundamental dignity and tries to preserve the spiritual and immortal elements. The most sensible characteristic of this type of art is the compatibility with the nature of Islam; monotheism, which the mosque architecture provides the best bed for such purpose. The main model for constructing mosques, from both outward and internal spiritual truths point of view, is th...

متن کامل

Protecting Poorly Chosen Secrets from Guessing Attacks

In a security system that allows people to choose their own passwords those people tend to choose passwords that can be easily guessed This weakness exists in practically all widely used systems Instead of forcing users to choose well chosen secrets which are likely to be di cult to remember we propose solutions that maintain both user convenience and a high level of security at the same time T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGARCH Computer Architecture News

سال: 2005

ISSN: 0163-5964

DOI: 10.1145/1080695.1069971