High Confidence Software and Systems Conference 2016

page

Visible to the public HCSS 2016 - Program Agenda

  Tuesday, May 10
Reasoning / IP
Wednesday, May 11
file

Visible to the public Moving Hardware from “Security through Obscurity” to “Secure by Design”

ABSTRACT
It is a difficult, perhaps impossible, task to design modern hardware that is impervious to any and every attack. It is hard to insure that these complex, multi-billion transistor systems are functionally correct, let alone secure. Yet, for the most part, computing system designers assume that the hardware is secure and focus their security efforts at higher levels of abstraction (OS, programming language, algorithm, etc.). Recent attacks have shown this is a false premise, and building upon an insecure foundation is a recipe for disaster.