The Rise of Hardware Security in Computer Architectures

被引:1
作者
Schaumont, Patrick [1 ]
Montuschi, Paolo [2 ]
机构
[1] Virginia Polytech Inst & State Univ, Comp Engn, Blacksburg, VA 24061 USA
[2] Polytech Univ Turin, Comp Engn, Turin, Italy
关键词
computer architecture; cybersecurity; hardware; security; Spotlight on Transactions;
D O I
10.1109/MC.2018.3191252
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This installment of Computer's series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Computers.
引用
收藏
页码:4 / 5
页数:2
相关论文
共 50 条
  • [31] ProMiSE: A High-Performance Programmable Hardware Monitor for High Security Enforcement of Software Execution
    Wang, Xinrui
    Feng, Lang
    Wang, Zhongfeng
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (11) : 3599 - 3612
  • [32] Improving Hardware Security for LoRaWAN
    Navarro-Ortiz, Jorge
    Chinchilla-Romero, Natalia
    Ramos-Munoz, Juan J.
    Munoz-Luengo, Pablo
    2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2019,
  • [33] Verifiable Security Templates for Hardware
    Harrison, William L.
    Allwein, Gerard
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 658 - 661
  • [34] Challenges and Methodologies of Hardware Security
    Li, Kin Fun
    Attarmoghaddam, Narges
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 928 - 933
  • [35] Software and Hardware Security of IoT
    Singh, Ashwini Kumar
    Kushwaha, Nagendra
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 436 - 440
  • [36] Towards Dynamic and Partial Reconfigurable Hardware Architectures for Cryptographic Algorithms on Embedded Devices
    Alkamil, Arkan
    Perera, Darshika G.
    IEEE ACCESS, 2020, 8 : 221720 - 221742
  • [37] The unified model of computer architectures
    Shen, Xu-Bang
    Liu, Ze-Xiang
    Wang, Ru
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (05): : 729 - 736
  • [38] SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors
    Meng, Dan
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2177 - 2177
  • [39] A Survey of Neuromorphic Computing-in-Memory: Architectures, Simulators, and Security
    Staudigl, Felix
    Merchant, Farhad
    Leupers, Rainer
    IEEE DESIGN & TEST, 2022, 39 (02) : 90 - 99
  • [40] One Giant Leap for Computer Security
    Okhravi, Hamed
    Burow, Nathan
    Skowyra, Richard
    Ward, Bryan C.
    Jero, Samuel
    Kazan, Roger
    Shrobe, Howard
    IEEE SECURITY & PRIVACY, 2020, 18 (04) : 8 - 19