High Confidence Software and Systems Conference 2016

webform

Visible to the public 70th Symposium - Bio Submission

webform

Visible to the public 2016 HCSS Conference Questionnaire

file

Visible to the public Science of Security and Privacy

Abstract:

file

Visible to the public Moving Hardware from “Security through Obscurity” to “Secure by Design”

ABSTRACT
It is a difficult, perhaps impossible, task to design modern hardware that is impervious to any and every attack. It is hard to insure that these complex, multi-billion transistor systems are functionally correct, let alone secure. Yet, for the most part, computing system designers assume that the hardware is secure and focus their security efforts at higher levels of abstraction (OS, programming language, algorithm, etc.). Recent attacks have shown this is a false premise, and building upon an insecure foundation is a recipe for disaster.