This Article 
 Bibliographic References 
 Add to: 
Let's stop trusting software with our sensitive data
April 2013 (vol. 30 no. 2)
pp. 103-104
C. Fletcher, MIT CSAIL, Cambridge, MA, USA
M. van Dijk, MIT CSAIL, Cambridge, MA, USA
S. Devadas, MIT CSAIL, Cambridge, MA, USA
The paper states that people are trusting the cloud more and more to perform sensitive operations. Demanding more trust in software systems is a recipe for disaster. Suppose the people only trust hardware manufacturers and cryptographers, and not system software developers, application programmers, or other software vendors. It will be the hardware manufacturer's job to produce a piece of hardware that provides some security properties. These properties will correspond to cryptographic operations being implemented correctly in the hardware and adding a modicum of physical security. The beauty of hardware is that its functionality is fixed. If we design our systems to only depend on hardware properties, then we need not worry about software changes or patches introducing new security holes-inevitable in current systems. How can it ensure privacy of data despite the practically infinite number of malicious programs out there? The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.
Index Terms:
security of data,cloud computing,cryptography,Ascend processor,data security,sensitive data,cloud computing,software system,security property,cryptographic operation,malicious program,data privacy,Cryptography,Software development,Hardware,Internet,Encryption
C. Fletcher, M. van Dijk, S. Devadas, "Let's stop trusting software with our sensitive data," IEEE Design & Test of Computers, vol. 30, no. 2, pp. 103-104, April 2013, doi:10.1109/MDAT.2013.2259096
Usage of this product signifies your acceptance of the Terms of Use.