The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2007 vol. 27)
ISSN: 0272-1732
pp: 25-35
Joshua J. Yi , Freescale Semiconductor
Derek Chiou , University of Texas at Austin
Resit Sendag , University of Rhode Island
Shay Gueron , University of Haifa and Intel Corporation
Geoffrey Strongin , Advanced Micro Devices
Jean-Pierre Seifert , University of Innsbruck and Samsung Electronics
How can we ensure that platform hardware, firmware, and software work in concert to withstand rapidly evolving security threats? Architectural innovations bring performance gains but can also create new security vulnerabilities. In this panel discussion, from the 2007 Workshop on Computer Architecture Research Directions, Shay Gueron, Geoffrey Strongin, and Jean-Pierre Seifert assess the current state of security and discuss possible routes toward trusted computing.
security and privacy protection; computer systems organization; microarchitecture implementation considerations; processor architectures; operating systems; software/software engineering; emerging technologies
Joshua J. Yi, Derek Chiou, Resit Sendag, Shay Gueron, Geoffrey Strongin, Jean-Pierre Seifert, "Where Does Security Stand? New Vulnerabilities vs. Trusted Computing", IEEE Micro, vol. 27, no. , pp. 25-35, November/December 2007, doi:10.1109/MM.2007.112
96 ms
(Ver 3.3 (11022016))